Font Size: a A A

Research On Key Technology Of Fingerprint Information Extraction For Cloud Server Based On XenServer

Posted on:2018-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:J WangFull Text:PDF
GTID:2348330521450973Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Information construction has received considerable attention in order to adapt to combat under the condition of informatization,build the integrated network platform construction and gain information superiority in the future.As the advanced technology relying on the information transmission of Internet,cloud computing has great technical advantages,as well as the ability of fast and efficient operation,among which the virtualization is the paramount technical foundation to realize the cloud computing.As the world's leading provider for infrastructure solutions,Citrix has a large market share in the field of cloud computing.What'more,Citrix has a number of patents,including Citrix ICA,which make Citrix the cutting edge of cloud computing development.Therefore,the study on Citrix cloud has a very large market value.This topic is mainly based on the server virtualization platform of Citrix Xen Server to carry out the research work.The current research mainly concentrates in the data storage and transport safety in the field of cloud computing security,and ignores the hidden safety problem of the cloud server;the most research work on the network communication only stays on the level of the identification of traditional network data flow and the feature extraction of network protocols,without identifying the server function on the basis of the analysis of the network protocol;the study on server fingerprint characteristic also rests on the Web Server,and does not take into account the lookup and location for the cloud server that is numerous and has the different function.Consider the limitation of the current work,this paper analyzes the network protocols based on the Citrix cloud environment,and identifies different functions of the cloud server combining with cloud server fingerprint extraction algorithm.This paper is supported by Citrix virtualization environments which from network attack and defense's point of way in the cloud platforms,and mainly targets the large server cluster in the cloud environment.By simulating the cloud environment on a small scale and configuring the port mirroring of the switch,we first use the Wireshark to capture and analyze communication data among Xen Center,Xen Server and virtual server.Secondly,we clear the specific function of the cloud network data flow on the basis of the analysis of network protocols.Thirdly,we extract server fingerprint features from big data and identify server function.Finally,the application software about cloud server identification is developed to realize the auto filter and visual display and solve the key issue of the lookup and positioning of a specific function server in the cloud environment in a high precision,which can provide accurate guide for offensive and defensive of network informatization,and provide the theoretical foundation and technical support for attacking core server of enemy network in this new kind of information warfare.Thus server fingerprint extraction below cloud environment has the extremely important significance.
Keywords/Search Tags:Citrix, Server Virtualization, Fingerprint Extraction, Software of Server Identification
PDF Full Text Request
Related items