Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
3Activity

Table Of Contents

1. INTRODUCTION
1.1 Background and Problem Statement
1.3 Thesis Statement
1.4 Document Organization
2 BACKGROUND AND RELATED WORK
2.2 Security of Virtualization Management Infrastructure
2.4 VMware as an example virtualization platform
2.5 VMware Security Model
2.6 Xen as a Virtualization Platform
2.8 Eucalyptus Open Source Platform and User Identity
2.9 Access Control Implemented in Modern Operating Systems
2.10 Identity and access management (IAM)
2.11 Federated Identity Management
2.12 Role-Based Access Control (RBAC) In the Cloud
2.13 Attack Surfaces on the IaaS Cloud
3 PROTOTYPE AND TEST APPROACH
Figure 1: Identity Management Domain Structure
3.1 Approach Components and Details
Figure 2: Logical Overview of Prototype Environment
3.1.2 Distributed Virtual Switches
3.1.3 iSCSI Shared Storage
3.1.4 Inside Network Routing and Switching
Table 2: Vlan details of prototype environment
3.1.6 Active Directory Domain #1 (prod.com)
3.1.7 Active Directory Domain #2 (sub.com)
3.1.10 Patch/Update Servers
3.1.11 Proxy/Reverse Proxy Server
Table 3: ISA firewall policy rules
3.1.12 Management Stack
3.1.13 VPN Access
3.1.14 Cloud Control and Management
Figure 3: Logical Components of Eucalyptus Cloud Control Portal
3.1.17 Snort Intrusion Detection Sensor
3.1.18 Splunk – Syslog Collector and Correlation
3.2.1 Misuse Case #1 Details and Procedures
Figure 4: Misuse Case #1 – Attack of the cloud control portal
3.2.2 Misuse Case #2 details and procedures
3.2.3 Misuse Case #3 details and procedures
3.2.4 Misuse Case #4 details and procedures
4 Results and Analysis
4.1 Active Directory Implementation Issues and Solutions in the Prototype
Table 23: Likewise – supported trust relationships
Table 24: Misuse case #1 log file results
Table 25: Misuse case #2 log file results
Figure 8: Attacking with vmware_guest_stealer
Table 26: Misuse case #3 log file results
Table 27: Misuse case #4 log file results
4.6 General Analysis Observations
5. Discussion
0 of .
Results for:
No results containing your search query
P. 1
skinnewt_masters_04-17-2012_01

skinnewt_masters_04-17-2012_01

Ratings: (0)|Views: 166 |Likes:
Published by Ted Skinner

More info:

Published by: Ted Skinner on Apr 19, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/09/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 37 are not shown in this preview.
You're Reading a Free Preview
Pages 41 to 69 are not shown in this preview.
You're Reading a Free Preview
Pages 73 to 119 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Danilo De Pauli liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->