簡易檢索 / 詳目顯示

研究生: 曾靖庭
Tseng, Ching-Ting
論文名稱: 以Kubernetes與嵌入式平台為基礎應用於主機入侵檢測系統之研究
Research on Host Intrusion Detection System Based on Kubernetes and Embedded Platform
指導教授: 黃文吉
Hwang, Wen-Jyi
口試委員: 董一志
Tung, Yi-Chih
尤信程
You, Shing-Chern
黃文吉
Hwang, Wen-Jyi
口試日期: 2022/07/25
學位類別: 碩士
Master
系所名稱: 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2022
畢業學年度: 110
語文別: 中文
論文頁數: 66
中文關鍵詞: 資訊安全容器嵌入式平台
英文關鍵詞: Intrusion Detection System, Kubernetes, Pod, Security Information Event Management
研究方法: 實驗設計法主題分析
DOI URL: http://doi.org/10.6345/NTNU202201349
論文種類: 學術論文
相關次數: 點閱:109下載:15
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著科技的日新月異,物聯網技術的發達,使得網路需求相當的廣泛,許多應用上都需要透過網路來傳達資訊,包括網路購物、線上辦公、智慧車聯網、智慧電視等等,而在資訊傳遞的過程,往往會不小心把重要資訊暴露在危險之中,因此,資訊安全也逐漸備受重視。
    傳統的Intrusion Detection System伺服器大多都佈署在一般常見的主機與作業系統上,雖然易於佈署,但是也導致系統暴露於資安的風險之中,容易被有心人士攻擊並且竊取資料。為了解決資安問題,我們以Kubernetes容器化集群來構建Host-based Intrusion Detection System (HIDS)結合Security Information Event Management (SIEM)成資訊安全日誌管理系統的微服務,由於他可以對多個容器進行管理並且快速自動佈署應用,兼具Load Balancer 以及自動偵測並重啟故障的容器的特點,除了可以提高資訊的隱蔽性,也可以防止單點故障的問題。
    在本論文中,以Kubernetes佈署資訊安全日誌管理系統的Server,每個Control Plane負責處理對集群的要求並調度集群內的資源,並且藉由Kube-vip來達到Load Balancer的功能來維持服務的提供,Worker Node分別運行對應的Pod,當Pod發生故障時會自動重啟,在系統管理方面相當有彈性。而Agent則可以兼容多個嵌入式平台,有效整合不同作業系統的資訊安全日誌。

    第 1 章 緒論 1 1-1 研究背景與動機 1 1-2 研究困難 4 1-3 研究目的 5 1-4 研究貢獻 6 第 2 章 基礎理論 8 2-1 ELK Stack日誌管理平台 9 2-2 Wazuh 10 2-3 Container 11 2-4 Kubernetes 12 2-5 Load Balancer 13 第 3 章 研究方法 14 3-1 佈署Kubernetes相關套件 15 3-2 Load Balancer高可用佈署 23 3-3 佈署Service 26 3-4 佈署Wazuh Server Pod 34 第 4 章 實驗結果與效能分析 41 4-1 實驗環境介紹 41 4-2 實驗測試平台 44 4-3 評估指標的介紹 47 4-4 效能分析結果評估 51 第 5 章 結論 63 參考文獻 64

    [1] Samodha Pallewatta, Vassilis Kostakos, Rajkumar Buyya. (2022). Microservices-based IoT Applications Scheduling in Edge and Fog Computing: A Taxonomy and Future Directions. arXiv preprint arXiv:2207.05399.

    [2] Vasiliki Demertzi, Stavros Demertzis, Konstantinos Demertzis. (2022). An Overview of Cyber Threats, Attacks, and Countermeasures on the Primary Domains of Smart Cities. arXiv preprint arXiv:2207.04424.

    [3] Jasmin Bogatinovski, Gjorgji Madjarov, Sasho Nedelkoski, Jorge Cardoso, Odej Kao. (2022). Leveraging Log Instructions in Log-based Anomaly Detection. arXiv preprint arXiv:2207.03206.

    [4] Dattaraj Rao, Shraddha Mane. (2021). Zero-shot learning approach to adaptive Cybersecurity using Explainable AI. arXiv preprint arXiv:2106.14647.

    [5] Tarrah R. Glass-Vanderlan, Michael D. Iannacone, Maria S. Vincent, Qian (Guinevere)Chen, Robert A. Bridges. (2018). A Survey of Intrusion Detection Systems Leveraging Host Data. arXiv preprint arXiv:1805.06070.

    [6] Kubernetes Official Website. Accessed on June 1, 2022. [Online]. Available: https://kubernetes.io/

    [7] Sudeep Pasricha. (2022). Embedded Systems Education in the 2020s: Challenges, Reflections, and Future Directions. arXiv preprint arXiv:2206.13717.

    [8] Joel Mandebi Mbongue, Danielle Tchuinkou Kwadjo, Christophe Bobda. (2021). Performance Exploration of Virtualization Systems. arXiv preprint arXiv:2103.07092.

    [9] Wazuh official Documentation. Accessed on June 1, 2022. [Online]. Available: https://wazuh.com

    [10] High Availability SearchDataCenter Documentation. Accessed on June 1, 2022. [Online]. Available: https://www.techtarget.com/searchdatacenter/definition/high-availability

    [11] ELK Stack official Documentation. Accessed on June 1, 2022. [Online]. Available: https://www.elastic.co/elastic-stack/

    [12] Swapneel Mehta, Prasanth Kothuri, Daniel Lanza Garcia. (2018). A Big Data Architecture for Log Data Storage and Analysis. arXiv preprint arXiv:1812.00111.

    [13] Manuel Rigger, Zhendong Su. (2020). Testing Database Engines via Pivoted Query Synthesis. arXiv preprint arXiv:2001.04174.

    [14] Jinhong Li, Qiuping Wang, Patrick P. C. Lee, Chao Shi. (2022). An In-Depth Comparative Analysis of Cloud Block Storage Workloads: Findings and Implications. arXiv preprint arXiv:2203.10766.

    [15] Apache Lucence official Documentation. Accessed on June 1, 2022. [Online]. Available: https://lucene.apache.org/

    [16] REST API Tutorial Documentation. Accessed on June 1, 2022. [Online]. Available: https://restfulapi.net/

    [17] JSON official Documentation. Accessed on June 1, 2022. [Online]. Available: https://www.json.org/json-en.html

    [18] Alexander Bakhtin, Abdullah Al Maruf, Tomas Cerny, Davide Taibi. (2022). Survey on Tools and Techniques Detecting Microservice API Patterns. arXiv preprint arXiv:2205.10133.

    [19] Ran Ben Basat, Gil Einziger, Isaac Keslassy, Ariel Orda, Shay Vargaftik, Erez Waisbard. (2022). Memento: Making Sliding Windows Efficient for Heavy Hitters. arXiv preprint arXiv:1810.02899.

    [20] Docker Hub official Documentation. Accessed on June 1, 2022. [Online]. https://hub.docker.com/

    [21] YAML Wiki Documentation. Accessed on June 1, 2022. [Online]. Available: https://zh.m.wikipedia.org/zh-tw/YAML

    [22] Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek. (2022). Vulnerability Prioritization: An Offensive Security Approach. arXiv preprint arXiv:2206.11182.

    [23] Virtual Box official Documentation. Accessed on June 1, 2022. [Online]. Available: https://www.virtualbox.org/

    [24] Kria KV260 Vision AI Starter Kit Documentation. Accessed on June 1, 2022. [Online]. Available: https://www.xilinx.com/products/som/kria/kv260-vision-starter-kit/kv260-getting-started/getting-started.html

    [25] Raspberry Pi Wiki Documentation. Accessed on June 1, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Raspberry_Pi

    [26] Pynq-z2 Official Documentation. Accessed on June 1, 2022. [Online]. Available: https://pynq.readthedocs.io/en/v2.3/getting_started/pynq_z2_setup.html

    [27] Kali Official Documentation. Accessed on June 1, 2022. [Online]. Available: https://www.kali.org/docs/

    [28] Hydra Tool Documentation. Accessed on June 1, 2022. [Online]. Available: https://www.kali.org/tools/hydra/

    [29] SSH (Secure Shell) Official Documentation. Accessed on June 1, 2022. [Online]. Available: https://www.ssh.com/academy/ssh

    [30] RDP (Remote Desktop Protocol) Wiki Documentation. Accessed on June 1, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Remote_Desktop_Protocol

    [31] Address Resolution Protocol (ARP) Wiki Documentation. Accessed on June 1, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Address_Resolution_Protocol

    [32] Hypertext Transfer Protocol Secure (HTTPS) Wiki Documentation. Accessed on June 1, 2022. [Online]. Available: https://en.wikipedia.org/wiki/HTTPS

    下載圖示
    QR CODE