Dissertation > Excellent graduate degree dissertation topics show

Research on Defense Mechanism of High Security Cluster Server

Author: JiangHuaiZhen
Tutor: ZouDeQing
School: Huazhong University of Science and Technology
Course: Computer Software and Theory
Keywords: Cluster Server Defense Mechanism Intrusion Response Response Decision-Making
CLC: TP393.08
Type: Master's thesis
Year: 2007
Downloads: 49
Quote: 0
Read: Download Dissertation

Abstract


Cluster becomes more and more popular in architecture of server because of its high scalability and cost performance. Clusters are applied in more and more fields, such as science computation, bio-engineering, Web services, FTP services, E-Mail service, etc. At the same time, these cluster servers are exposed to an increasing number of attacks. A cluster is not only a distributed system, but also a single whole system (Single System Image) to provide service. A cluster has feature both of distributed system and single system. There are some potential threaten nodes in it. It is also confronted with external attacks coming from public networks. As a cluster server’s role is to provide services, it should provide services as far as possible to the legitimate requests for visits while protected from attacks.The goal of HS-C is to research for a mechanism of defense and enhancing the cluster by TPM (Trusted Platform Module) to protect cluster server from external and internal attacks in the current environment of insecurity and to provide server and users a credible environment for services, and provide users with trusted services. With the security enhance of services to protect server and provide users with high performance services.The goal of the defense mechanism of the HS-C is to research for a mechanism that can detect attacks and make analysis and make response in the best way. Considered one essential characteristic of cluster server is to provide services, the cluster server should provide the services to the legitimate user during being protected from attacks.The statistical methods used to compute the current sum and speed of the attacks of the system and compute the current sum and speed of the attacks of attack IP, uses the attacks speed compare with the threshold value to indicate if attacks increase to run over the system limit. Uses three levels responses mechanism to carry on the intrusion response to the individual attack and the high speed single-source IP attacks and the more high speed attacks to the system. Only blocks the attacks connections when the system can withstand attacks intensity. Once the attacks speed of a source IP to run over the system threshold value of attack IP blocks all connections of the attack IP. When the system suffered attacks on the speed beyond the limit of the system, reports to the administrator and blocks all connections of all attack IP. According to historical data of attacks to adjust the interdiction time, the more attack times the more interdiction time will be taken, to reduce the exposure of the system to the continuing attacks on the time and frequency.

Related Dissertations

  1. The Correlate Study of Defense Style and Social Support, Coping Style of Depression in Patients with Maintenance Hemodialysis,R473.5
  2. The Modeling Research and Performance Evaluation of Cluster Server System,TP393.05
  3. Active cluster network server scheduling mechanism,TP393.03
  4. Based on highly reliable server cluster study,TP393.05
  5. Study and Design of Linux-Based Scalable Cluster Server,TP316.81
  6. Research and implementation of digital library architecture and access control,G250.76
  7. Scheduling Scheme and Performance Assessment for Timely Responsive Service on Cluster Server,TP393.05
  8. The Research and Performance Analysis on the Queue Schedule Mechanism of the Dispatcher in the Auto Self-Allocating Cluster System,TP393.05
  9. Research and Performance Analysis of Cluster Server,TP368.5
  10. Research of Knowledge Grid Based on Knowledge Base,TP18
  11. Web Cluster Server and Management System,TP393.05
  12. Research on ASAS Cluster and Its Intelligent Control Mechanism,TP273.5
  13. The performance of the IP network transmission link congestion control cluster server side,TN915.07
  14. Research on Recovery-Oriented Fault-Tolerant Computing Technique,TP311.52
  15. Interaction of Arabidopsis Thaliana and Sclerotinia Sclerotiorum and Screening of Arabidopsis Mutants Related to Sclerotinia Sclerotiorum and Xanthomonas Oryzae pv.oryzae,S435.11;S332.2
  16. The Research on Minority College Students’ Defense Mechanism and Narcissism,B844.2
  17. Life and Death: A Psychoanalytic Interpretation of Mrs. Dalloway,I561
  18. Expressions of PAF on the Protecting Effect of JZYYP on the Gastric Mucosa of Rats and Its Mechanism for This Effect,R285.5
  19. Automated Intrusion Response Network risk assessment system,TP393.08
  20. A Freudian Psychoanalytic Interpretation of the Protagonist of the Financier,I712
  21. Dynamic Game Based Intrusion Response Decision-Making Model,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile