跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.106) 您好!臺灣時間:2026/04/06 12:38
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:鄭景仁
研究生(外文):Ching-Ren Cheng
論文名稱:一種利用SCIT防禦機制的資料庫系統
論文名稱(外文):A Protect Method for Database by Using The SCIT Mechanism
指導教授:黃德成黃德成引用關係
口試委員:陳偉銘婁德權
口試日期:2012-07-27
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊網路多媒體研究所
學門:電算機學門
學類:網路學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:66
中文關鍵詞:入侵容忍
外文關鍵詞:Intrusion Tolerance
相關次數:
  • 被引用被引用:0
  • 點閱點閱:143
  • 評分評分:
  • 下載下載:1
  • 收藏至我的研究室書目清單書目收藏:0
隨著網路的快速發展和資訊的廣泛應用,使用者對網路上的服務之依賴性也越來越高,但是由於網路的開放性,長期曝露於網路上的伺服器,成為入侵者的目標似乎是無法避免的,因此安全防護措施的建立是非常重要的。
然而絕大多數的安全防禦技術著重於如何保護系統,以免除外界的惡意入侵,但未考量到伺服器一旦被入侵,要如何讓系統在其功能產生異常狀況時,仍然可以繼續對外界提供正常服務之重點。而入侵容忍正是解決上述問題的最佳方案。
但是對於資料庫而言,一旦被入侵,致使資料遭到惡意破壞,其所造成的後果並非是引用入侵容忍方式就可以解決的,還必須要能在短時間內找到被破壞的資料,迅速將其修正。
因此本論文提出針對資料庫入侵的檢測機制之建置。當資料庫被入侵時,即使資料被破壞,經由該機制的處理,被破壞的資料仍可回復至未被破壞時的狀態。


With the rapid development of network and information, users highly rely on the online services. Because of open nature of network, the long-term exposed servers have become the target of intrusion. Therefore, how to build a security mechanism is the most important issue currently.
Most security protection technologies focus on protecting systems to avoid malicious intrusion. However, there is lack of considering the continued ability of providing normal service when the intrusion activities appear. The Intrusion Tolerance technique is proposed to be the best solution to cope with such an issue.
As for database invasion, the damages are not only recovered by intrusion tolerant skills, but also fixed by finding the destroyed data in a short time of period. Therefore, this paper presents a database intrusion detection building mechanism to recover the database destructed back to its intact status.


摘要 i
Abstract ii
第一章 緒論 1
1.1 前言 1
1.2 研究背景 2
1.3 研究動機 5
1.4 論文架構 6
第二章 文獻回顧 7
2.1 自我清除入侵容忍(SCIT) 7
2.2 虛擬化技術 8
2.3 SCIT之運作 10
2.4 SCIT之安全機制 15
2.5 還原演算法 17
2.6 SCIT規劃之因素 20
2.7 適用情況及其效益 28
第三章 研究方法 30
3.1前言 30
3.2資料庫檢核流程圖說明 31
3.3環境建置流程 33
3.4環境簡介 34
3.5建置流程 35
3.6資料庫檢測機制之建置流程圖 37
第四章 實作結果 39
4.1 SCIT Web 39
4.2 MySQL叢集(Cluster)系統 43
4.3資料庫檢測機制之建立流程 46
第五章 結論 50
附錄 54
參考文獻 64



[1] Quyen L. Nguyen and Arun Sood, “Comparative Analysis
of Intrusion-Tolerant System Architectures," IEEE
Security and Privacy. pp. 24-31, July-Aug. 2011.
[2] D.F. McAllister, C.E. Sun and M.A. Vouk, "Reliability of Voting in Fault-Tolerant Software Systems for Small
Output Spaces", IEEE Trans. Rel., Vol 39(5), pp 524-534,
1990.
[3] James C. Reynolds , James E. Just , Ed Lawson , Larry A. Clough , Ryan Maglich , Karl N. Levitt, “The Design and
Implementation of an Intrusion Tolerant System,
“ Proceedings of the 2002 International Conference on
Dependable Systems and Networks, p.285-292, June 23-26,
2002
[4] D. Arsenault, A. Sood, Y. Huang, “Secure, resilient
computing clusters: self-cleansing intrusion tolerance with hardware enforced security (SCIT/HES)”, Second International Conference on Availability, Reliability and Security, Fairfax, Virginia, February 2007.
[5] Paulo Sousa, Alysson Neves Bessani, Miguel Correia,
Nuno Ferreira Neves, Paulo Verissimo. “Resilient Intrusion
Tolerance through Proactive and Reactive Recovery. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 373--380. December 2007
[6] Yih Huang, David Arsenault, and Arun Sood, “Closing
Cluster Attack Windows through Server Redundancy and Rotations” Proceedings of the Second International Workshop on Cluster Security (Cluster-Sec06),Singapore,
May 2006
[7] Y. Huang, A. Ghosh, T. Bracewell and B. Mastropietro, A security evaluation of a novel resilient Web serving
architecture: Lessons learned through industry/academia collaboration,” Proceedings of the International
Conference on Dependable Systems and Networks
Workshops, pp. 188–193, 2010.
[8] Hans P. Reiser, Tobias Distler, Rüdiger,”Functional
decomposition and interactions in hybrid intrusion-tolerant
systems,” Proceedings of the 3rd International DiscCoTec
Workshop on Middleware-Application Interaction, pp.
7-12,2009.
[9] Yih Huang and Arun Sood, "Self-Cleansing Systems for
Intrusion Containment", Proceedings of Workshop on
Self-Healing, Adaptive, and Self-Managed Systems (SHAMAN), New York City, June 2002.
[10] Amit Singh, “An Introduction To Virtualization,”
http://research.ihost.com/osihpa/osihpa-hensbergen.pdf,
February 5, 2004.
[11] M. Rosenblum, and T. Garfinkel,“Virtual Machine
Monitors: Current Technology and Future Trends,” Vol.38, No. 5, IEEE Computer, pp. 39-47, 2005 May.
[12] R. P. Goldberg. “Architecture of virtual machines,” In proc. of the workshop on virtual computer systems, NY,
USA, pages 74-112. ACM Press , New York, 1973.
[13] VirtualBox, Sun Microsystems,Inc.,
http://www.virtualbox.org
[14] Yih Huang, David Arsenault, and Arun Sood, “SCITDNS:
Critical Infrastructure Protection through Secure DNS
Server Dynamic Updates,” presented at the Trusted
Internet Workshop Conference, Bangalore, India, December 2004. (Extended version to appear in Journal of
High Speed Networking)
[15] Arun Sood, “Minimizing Losses from Zero Days –A New Layer of Defense (SCIT),” Presented at the GFIRST 2010, San Antonio, TX, 2010.
[16] Yih Huang, Arun Sood, and Ravi K. Bhaskar,
“Countering Web Defacing Attacks with System
Self-Cleansing,” Proceedings of 7th Word Multiconference
on Systemics, Cybernetics and Informatics, pp. 12-16,
Orlando, Florida, July 2003.
[17] Anju Bala, Inderveer Chana., “Fault
tolerance-Challenges, Techniques and Implementation in
Cloud Computing” in International Journal of Computer
Science Issues (IJCSI), pp238-246, Volume 9, Issue 1,
January 2012.
[18] http://haproxy.1wt.eu/download/1.3/doc/configuration.txt
[19] Yih Huang, David Arsenault, and Arun Sood,
"Incorruptible Self-Cleansing Intrusion Tolerance and Its
Application to DNS Security" Journal of Networks,
Academy Press, vol 1 No 5, pp 21 - 30, September/October
2006.
[20] Yih Huang, David Arsenault, and Arun Sood,
“Incorruptible System Self-Cleansing for Intrusion
Tolerance", Proceedings Workshop on Information Assurance (WIA 2006), Phoenix, AZ, April 2006
[21] Q.Nguyen and A. Sood. “Quantitative Approach to
Tuning of a Time-Based Intrusion-Tolerant System Architecture,”. 3rd Workshop on Recent Advances on
Intrusion-Tolerant Systems, Lisbon, Portugal, 2009.
[22] Quyen L. Nguyen, Arun Sood, "Designing SCIT
architecture pattern in a Cloud-based environment,"
Dependable Systems and Networks Workshops, pp.123-128, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops, 2011 [23] Anantha K. Bangalore and Arun K Sood. “Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT),” DEPEND 2009, Athens, Greece 2009.
[24] Yih Huang, David Arsenault, and Arun Sood, “Securing
DNS Services through System Self Cleansing and Hardware Enhancements,” Proceedings First International Conference on Availability, Reliability and Security ,Austria, April 2006.


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top