首页> 外文学位 >A forensic study of data leakage from one virtual desktop client as it relates to another virtual desktop client with the same hosting network.
【24h】

A forensic study of data leakage from one virtual desktop client as it relates to another virtual desktop client with the same hosting network.

机译:对一个虚拟桌面客户端与另一个具有相同托管网络的虚拟桌面客户端相关的数据泄漏进行的法医研究。

获取原文
获取原文并翻译 | 示例

摘要

Today, current network designs utilize virtual environments designed with one or multiple hosts utilizing a hypervisor technology to control multiple clients. Each host shares resources that can be leveraged by clients as needed. Previous research has focused on concerns that lie within the client environment, with little concern for the hosting machine. The design of this dissertation is to focus research from one client to another, within different virtual environments. The focus will be to determine if there is a risk of data leakage from one client to another that can be identified and collected. The base hypothesis of this dissertation is that data created on one client is identifiable, recoverable, and discernable within another client without manipulation or exploitation of the client's operating systems. The researcher designed a testing methodology in such a way to ensure consistent, repeatable results during the complete testing process. The ESXi 5-5 server host environment was created using the basic vendor installation instructions within a VMware virtual workstation environment. The collected and evaluated research data showed that memory allocation design of the ESXi 5-5 server provided the opportunity for data from each client---which was originally created solely within other clients' operating system---to be collected. The resulting data showed that various types of information were capable of being collected and used, including complete documents, usernames, passwords, and Internet search terms. A security threat of this type of design, where virtual environments are used to host the ESXi 5-5 server, presents risks that need to be understood and mitigated through alternative methods.
机译:如今,当前的网络设计利用虚拟环境,该虚拟环境设计有一个或多个主机,并利用虚拟机监控程序技术来控制多个客户端。每个主机共享可根据需要由客户端利用的资源。以前的研究集中在客户端环境中的问题上,而对托管计算机的关注很少。本文的设计目的是在不同的虚拟环境中,将研究重点从一个客户转移到另一个客户。重点将是确定是否存在可以识别和收集的数据从一个客户端泄漏到另一个客户端的风险。本文的基本假设是,在一个客户端上创建的数据在另一个客户端内是可识别,可恢复和可辨别的,而无需操纵或利用客户端的操作系统。研究人员设计了一种测试方法,以确保在整个测试过程中获得一致,可重复的结果。 ESXi 5-5服务器主机环境是根据VMware虚拟工作站环境中的基本供应商安装说明创建的。收集并评估的研究数据表明,ESXi 5-5服务器的内存分配设计为收集每个客户端(最初仅在其他客户端操作系统中创建)的数据提供了机会。结果数据表明可以收集和使用各种类型的信息,包括完整的文档,用户名,密码和Internet搜索词。使用虚拟环境托管ESXi 5-5服务器的这种设计类型的安全威胁带来了需要通过替代方法来理解和缓解的风险。

著录项

  • 作者

    Rupocinski, Robert J.;

  • 作者单位

    Colorado Technical University.;

  • 授予单位 Colorado Technical University.;
  • 学科 Information technology.;Information science.;Computer science.
  • 学位 D.C.S.
  • 年度 2016
  • 页码 92 p.
  • 总页数 92
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号