Title of article :
Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System
Author/Authors :
Chen, Zhen Tsinghua University - Research Institute of Information Technology - Tsinghua National Laboratory for Information Science and Technology (TNList), China , Han, Fuye Tsinghua University - Research Institute of InformationTechnology - Department of Computer Science and Technology, Tsinghua National Laboratory for Information Science and Technology (TNList), China , Cao, Junwei Tsinghua University - Research Institute of Information Technology - Tsinghua National Laboratory for Information Science and Technology (TNList), China , Jiang, Xin Tsinghua University - Research Institute of InformationTechnology - Tsinghua National Laboratory for Information Science and Technology (TNList), Department of Computer Science and Technology, China , Chen, Shuo Tsinghua University - Research Institute of Information Technology - Department of Automation, Tsinghua National Laboratory for Information Science and Technology (TNList), China
Abstract :
Internet security problems remain a major challenge with many security concerns such as Internetworms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloudbased security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively.
Keywords :
cloud computing , overlay network , collaborative network security system , computer forensics , antibotnet , anti , phishing , hadoop file system , eucalyptus , amazon web service
Journal title :
Tsinghua Science and Technology
Journal title :
Tsinghua Science and Technology