跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.85) 您好!臺灣時間:2024/12/15 01:30
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:張育涵
研究生(外文):Yu-han Chang
論文名稱:運用雲端運算改善偵測效能
論文名稱(外文):Improving Detection Efficiency using Cloud Computing
指導教授:陳嘉玫陳嘉玫引用關係
指導教授(外文):Chia-Mai Chen
學位類別:碩士
校院名稱:國立中山大學
系所名稱:資訊管理學系研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2016
畢業學年度:105
語文別:中文
論文頁數:58
中文關鍵詞:入侵偵測系統分散式檔案系統雲端運算
外文關鍵詞:Distributed File SystemCloud ComputingIntrusion Detection System
相關次數:
  • 被引用被引用:0
  • 點閱點閱:255
  • 評分評分:
  • 下載下載:14
  • 收藏至我的研究室書目清單書目收藏:0
近年來,隨著網際網路的便利以及迅速普及的特性,使得資訊安全遭受到前所未有的挑戰與威脅,網路成為攻擊者有利可圖的途徑之一,許多組織、企業以及政府單位,為了要對複雜且多變的網路攻擊行為進行防禦,大多會添購防火牆、入侵偵測系統,或是入侵防護系統等資訊安全設備。
隨著組織與企業添購的資安設備越來越多後,也衍生出相關的難題,各種不同資料來源格式的Log、資料記錄檔案過大,以及傳統架構下的入侵偵測系統無法進行對長時間的Log資料進行分散式儲存、平行運算等分析,也使得組織與企業在資料處理的能力遭受到前所未有的挑戰與威脅。
本研究所提出的巨量資料運算框架,分別透過儲存空間、資料節點數、CPU、記憶體與網路頻寬不同的搭配與設定,替組織與企業內部提供了雲端環境配置的參考依據,並藉由對目前資料進行全面性的分析,衡量雲端運算以及使用雲端儲存環境之使用。
本研究所提出雲端環境中的異常偵測系統架構,不僅可以透過Hadoop多節點叢集,對巨量資料記錄檔進行分散式儲存,更使用雲端運算中Spark的優點,改善傳統入侵偵測系統無法進行長時間區間Event Correlation的缺點,藉此建立雲端運算中的入侵偵測系統架構。同時,本研究收集真實企業之巨量資料,來做為實驗之資料集,在傳統架構與雲端環境中處理,作為偵測效能以及系統效率差異比較,證實巨量資料處理在雲端叢集式系統中有較好的偵測效能與表現。
Recently, with the popularity and convenience features of Internet, Internet has become one of the attacker profitable way to enter the local area network. Most organizations, companies and government agencies will purchase the firewall, intrusion detection systems, intrusion prevention systems or other information security system to prevent and defense their network.
With the increasing of the security infrastructure and system, these problems can have a significant impact on organizations. For example, All kinds of Raw Log Messages in different formats and big data storage are important issues. The traditional data analysis architecture by means of a powerful server has serious performance issues when processing big data.
This study proposes a cloud computing architecture by deploy the settings of storage space, number of namenode and datanode, CPU, memory and network bandwidth to make cloud computing system more efficacy. This study proposes an open source cloud computing platform solution for storing and analyzing big data. Clustered and distributed storage provided by the open source cloud platform, Hadoop, improves the time and storage issue faced in traditional centralized architecture. To improve the bottleneck of the read/write access time during big data processing, in-memory processing technology, Spark, is adopted to reduce the number of disk accesses. The experimental results demonstrate that the proposed cloud platform provides a great performance improvement.
摘要 i
Abstract ii
圖次 iv
表次 vi
第1章 緒論 1
1.1 研究背景 1
1.2 研究動機 5
1.3 研究目的 9
第2章 文獻探討 10
2.1 雲端運算 10
2.2 Hadoop 12
2.3 分散式檔案系統 14
2.4 平行運算 15
2.5 Spark 19
2.6 入侵偵測方法 21
2.7 雲端運算增進之效能 23
第3章 系統設計 25
3.1 系統架構 25
3.2 系統參數 27
3.3 系統元件描述 31
3.4 雲端叢集環境 34
第4章 系統評估 36
4.1 資料集 36
4.2 實驗參數 37
4.3 系統評估 37
4.4 系統效能 42
4.5 系統比較 43
第5章 結論與未來展望 45
參考文獻 47
[1]M. Burstein, C. Bussler, T. Finin, M. Huhns, M. Paolucci, A. Sheth, et al., "A semantic web services architecture," IEEE Internet Computing, vol. 9, pp. 72-81, 2005.
[2]M. J. Franklin, M. J. Carey, and M. Livny, "Transactional client-server cache consistency: Alternatives and performance," ACM Transactions on Database Systems (TODS), vol. 22, pp. 315-363, 1997.
[3]K. McGaughey, "EMC news: Worl’ data more than doubling every Two Years—Driving big data opportunity, new IT roles," 2011. [Online]. Available: https://www.emc.com/about/news/press/2011/20110628-01.htm. [Accessed: 12- Sep- 2016]
[4]DatafloqHome, "Big data at Walmart is all about big numbers; 40 Petabytes a day!," 2015. Available: https://datafloq.com/read/big-data-walmart-big-numbers-40-petabytes/1175. [Accessed: 12- Sep- 2016]
[5]M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, et al., "A view of cloud computing," Communications of the ACM, vol. 53, pp. 50-58, 2010.
[6]iThome 電腦周刊, " 3種Big Data部署方式",2012. [Online]. Available: http://www.ithome.com.tw/tech/88330. [Accessed: 12- Sep- 2016]
[7]iThome電腦周刊, "解決生產良率痛點 半導體產業走入大資料分析", 2014.[online]. Available:http://www.ithome.com.tw/news/92292. [Accessed: 12- Sep- 2016]
[8]iThome電腦周刊, "力可科技導入Cassandra開源資料庫 10分鐘能擴充20萬人用量", 2013. [online]. Available:http://www.ithome.com.tw/tech/87417[Accessed: 12- Sep- 2016]
[9]iThome電腦周刊, "趨勢科技用Spark打造大資料分析架構,克服單日GB級APT資料分析挑戰", 2016. [online]. Available: http://www.ithome.com.tw/news/103292. [Accessed: 12- Sep- 2016]
[10]J. Han, E. Haihong, G. Le, and J. Du, "Survey on NoSQL database," in Pervasive computing and applications (ICPCA), 2011 6th international conference on, 2011, pp. 363-366.
[11]P. He, J. Zhu, S. He, J. Li, and M. R. Lyu, "An evaluation study on log parsing and its use in log mining," in Dependable Systems and Networks (DSN), 2016 46th Annual IEEE/IFIP International Conference on, 2016, pp. 654-661.
[12]黃彥棻, "推動BYOD的3大安全管控作法", 2012. [online]. iThome online. Available: http://online.ithome.com.tw/itadm/article.php?c=73587&s=1. [Accessed: 12- Sep- 2016]
[13]A. Williams, "Security Information and Event Management Technologies", Siliconindia, Vol. 10, No.1, 2006, pp. 34-35.
[14]R. Gabriel, T. Hoppe, A. Pastwa, and S. Sowa, "Analyzing malware log data to support security information and event management: Some research results," in Advances in Databases, Knowledge, and Data Applications, 2009. DBKDA''09. First International Conference on, pp. 108-113, 2009.
[15]T. Kenaza and M. Aiash, "Toward an Efficient Ontology-Based Event Correlation in SIEM," Procedia Computer Science, vol. 83, pp. 139-146, 2016.
[16]The NIST definition of cloud computing, NIST SP 800-145, 2011.
[17]M. D. Dikaiakos, D. Katsaros, P. Mehra, G. Pallis, and A. Vakali, "Cloud computing: Distributed internet computing for IT and scientific research," IEEE Internet computing, vol. 13, 2009.
[18]Infovision. Inc, "Service offerings," 1995. [Online]. Available: http://www.infovision.com/services/technology-solutions/big-data-analytics/service-offerings. [Accessed: 12- Sep- 2016]
[19]T. White, Hadoop: The definitive guide: " O''Reilly Media, Inc.", 2012.
[20]林大貴,《Hadoop+Spark大數據巨量分析與機器學習整合開發實戰》,博碩文化股份有限公司,ISBN:9789864340545,2015。
[21]A. Thusoo, J. S. Sarma, N. Jain, Z. Shao, P. Chakka, N. Zhang, et al., "Hive-a petabyte scale data warehouse using hadoop," in 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010), 2010, pp. 996-1005.
[22]D. Borthakur, "HDFS architecture guide," HADOOP APACHE PROJECT, 2016. [online]. Available:http://hadoop.apache.org/docs/current/. [Accessed: 12- Sep- 2016]
[23]Y. Zhang, "Understanding HDFS recovery processes (part 1) - Cloudera engineering Blog," Cloudera Engineering Blog, 2015. [Online]. Available: http://blog.cloudera.com/blog/2015/02/understanding-hdfs-recovery-processes-part-1/. [Accessed: 12- Sep- 2016]
[24]B. Jia, T. W. Wlodarczyk, and C. Rong, "Performance considerations of data acquisition in hadoop system," in Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, 2010, pp. 545-549.
[25]闞大成, "Hadoop與MapReduce 開發巨量資料應用", 2012. [online]. Available: http://www.digitimes.com.tw/tw/dt/n/shwnws.asp?CnlID=13&Cat=30&id=295141#ixzz3ra9BKrL2. [Accessed: 12- Sep- 2016]
[26]M. Cardosa, C. Wang, A. Nangia, A. Chandra, and J. Weissman, "Exploring mapreduce efficiency with highly-distributed data," in Proceedings of the second international workshop on MapReduce and its applications, 2011, pp. 27-34.
[27]Z. Xiao, H. Chen, and B. Zang, "A hierarchical approach to maximizing MapReduce efficiency," in Parallel Architectures and Compilation Techniques (PACT), 2011 International Conference on, 2011, pp. 167-168.
[28]M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica, "Spark: Cluster Computing with Working Sets," HotCloud, vol. 10, p. 95, 2010.
[29]M. Zaharia, An architecture for fast and general data processing on large clusters: Morgan & Claypool, 2016.
[30]H. Ayyalasomayajula, "An Evaluation of the Spark Programming Model For Big Data Analytics," University of Houston, 2015.
[31]X. Lin, P. Wang, and B. Wu, "Log analysis in cloud computing environment with Hadoop and Spark," in Broadband Network & Multimedia Technology (IC-BNMT), 2013 5th IEEE International Conference on, 2013, pp. 273-276.
[32]SPARK APACHE PROJECT, "Spark Architecture", Available: http://spark.apache.org/docs/latest/cluster-overview.html, 2016. [online]. [Accessed: 12- Sep- 2016]
[33]L. Li, D.-Z. Yang, and F.-C. Shen, "A novel rule-based Intrusion Detection System using data mining," in Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, 2010, pp. 169-172.
[34]C. V. Zhou, C. Leckie, and S. Karunasekera, "A survey of coordinated attacks and collaborative intrusion detection," Computers & Security, vol. 29, pp. 124-140, 2010.
[35]Y.-L. Ding, L. Li, and H.-Q. Luo, "A novel signature searching for intrusion detection system using data mining," in Machine Learning and Cybernetics, 2009 International Conference on, pp. 122-126, 2009.
[36]H. R. Zeidanloo, M. J. Z. Shooshtari, P. V. Amoli, M. Safari, and M. Zamani, "A taxonomy of botnet detection techniques," in Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, 2010, pp. 158-162.
[37]K. Stroeh, E. R. M. Madeira, and S. K. Goldenstein, "An approach to the correlation of security events based on machine learning techniques," Journal of Internet Services and Applications, vol. 4, p. 1, 2013.
[38]X. Xu, "Adaptive intrusion detection based on machine learning: feature extraction, classifier construction and sequential pattern prediction," International Journal of Web Services Practices, vol. 2, pp. 49-58, 2006.
[39]T. G. Nair and M. Vaidehi, "Efficient resource arbitration and allocation strategies in cloud computing through virtualization," in 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011, pp. 397-401.
[40]E. Dede, M. Govindaraju, D. Gunter, R. S. Canon, and L. Ramakrishnan, "Performance evaluation of a mongodb and hadoop platform for scientific data analysis," in Proceedings of the 4th ACM workshop on Scientific cloud computing, 2013, pp. 13-20.
[41]E. Feller, L. Ramakrishnan, and C. Morin, "Performance and energy efficiency of big data applications in cloud environments: A Hadoop case study," Journal of Parallel and Distributed Computing, vol. 79, pp. 80-89, 2015.
[42]M. Odersky, P. Altherr, V. Cremet, B. Emir, S. Maneth, S. Micheloud, et al., "An overview of the Scala programming language," 2004.
[43]K. Tannir, Optimizing Hadoop for MapReduce: Packt Publishing Ltd, 2014.
[44]A. Davidson and A. Or, "Optimizing shuffle performance in spark," University of California, Berkeley-Department of Electrical Engineering and Computer Sciences, Tech. Rep, 2013.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊