DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Yoon, Hyun-Soo | - |
dc.contributor.advisor | 윤현수 | - |
dc.contributor.author | Lim, Jung-Min | - |
dc.contributor.author | 임정민 | - |
dc.date.accessioned | 2015-04-23T08:30:43Z | - |
dc.date.available | 2015-04-23T08:30:43Z | - |
dc.date.issued | 2014 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=591850&flag=dissertation | - |
dc.identifier.uri | http://hdl.handle.net/10203/197837 | - |
dc.description | 학위논문(박사) - 한국과학기술원 : 전산학과, 2014.8, [ v, 67 p. ] | - |
dc.description.abstract | Recently the building of strong intrusion tolerance systems is in great demand since the openness and the distributed nature of information systems are easily used to compromise the systems by intentional attacks. To achieve intrusion tolerance by enabling the systems survive various types of intrusions, we suggest a novel approach, Adaptive Cluster Transformation (ACT) and several advanced schemes, in this paper. Instead of using a fixed cluster size as in conventional approaches, ACT adapts a variable cluster size depending on the system status. This is proved to maintain good quality of service (QoS). In addition, the early prediction of incoming massive packets makes ACT possible to replace any damaged clusters with new ones consisting of pristine virtual machines (VMs). This also contributes to defend the system against a Denial of Service (DoS). Two schemes are suggested in order to complement ACT:vulnerability-based VM selection and fast transformation based on historical data. In case current cluster should be expanded, new VMs are chosen based on each VM`s vulnerability. It is verified that this process helps to reduce the data leakage of whole system through adjusting the frequency of exposure according to vulnerability. Also, if enough historical data is secured, much more fast transformation than the case of using only ACT is possible. This is because next incoming packet rate is expected through historical data map generated through enough learning process. The performance of ACT is compared with other fixed size of VM cluster architectures by CSIM 20. And it is verified that the proposed method is more effective in maintaining the specific level of QoS as well as providing strong security to targeted system. Furthermore, as the number of exposure increases, the rate of information leakage with vulnerability-based VM selection is drastically decreased. | eng |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | adaptive intrusion tolerance systems | - |
dc.subject | 히스토리 데이터 | - |
dc.subject | 취약성 기반 가상 머신 선정 | - |
dc.subject | 클러스터 변환 | - |
dc.subject | 서비스 거부공격 | - |
dc.subject | 능동형 침입감내시스템 | - |
dc.subject | Denial of Service (DoS) | - |
dc.subject | cluster transformation | - |
dc.subject | vulerability-based VM selection | - |
dc.subject | historical data | - |
dc.title | The design of adaptive intrusion tolerance system based on virtualization | - |
dc.title.alternative | 가상화 기반의 능동형 침입감내시스템 설계 | - |
dc.type | Thesis(Ph.D) | - |
dc.identifier.CNRN | 591850/325007 | - |
dc.description.department | 한국과학기술원 : 전산학과, | - |
dc.identifier.uid | 020115251 | - |
dc.contributor.localauthor | Yoon, Hyun-Soo | - |
dc.contributor.localauthor | 윤현수 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.