contentsamazonec2
amazonec2 时间:2021-03-26 阅读:(
)
Chapter18DIGITALWATERMARKINGOFVIRTUALMACHINEIMAGESKumikoTadano,MasahiroKawato,RyoFurukawa,FumioMachidaandYoshiharuMaenoAbstractThewidespreaduseofserveranddesktopvirtualizationtechnologiesincreasesthelikelihoodofunauthorizedanduncontrolleddistributionofvirtualmachine(VM)imagesthatcontainproprietarysoftware.
Thispaperattemptstoaddressthisissueusingaplatform-independentdig-italwatermarkingschemeapplicabletoavarietyofVMimages.
TheschemeembedsawatermarkintheformoflesinaVMimage;thewatermarkedVMimageisidentiedbasedontheembeddedles.
Toreducethepossibilityofdiscoverybyanattacker,thenamesoftheem-beddedlesareverysimilartothenamesofpre-existinglesintheVMimage.
Experimentsindicatethattheapproachisfastandaccu-rate,withaverageturnaroundtimesof24.
001secondsand7.
549secondsforwatermarkgenerationanddetection,respectively.
Keywords:Digitalwatermarking,virtualmachineimages1.
IntroductionInmodernenterprisecomputingthereisagrowingtrendtowardcon-solidatingvirtualmachines(VMs)intheserverandclientsidestoreducecostsandenhanceportabilityandsecurity.
SuchenvironmentsrequirethemeanstoexportVMimagestotestsoftwareandtobackupVMs.
Forexample,Amazon'sElasticComputeCloud[1]andSimpleStorageService[2]providethecommandec2-download-bundletodownloadVMimagesfromadatacentertolocalcomputers[3].
Unfortunately,thistechnologyalsofacilitatestheunauthorizeddisseminationofVMimagescontainingproprietarysoftware.
Oneapproachforaddressingthisissueistousehost-basedintru-siondetectionsystemssuchasTripWire,AIDEandXenFIT[8].
TheseK.
-P.
Chow,S.
Shenoi(Eds.
):AdvancesinDigitalForensicsVI,IFIPAICT337,pp.
257–268,2010.
cIFIPInternationalFederationforInformationProcessing2010258ADVANCESINDIGITALFORENSICSVIsystemsmonitorunauthorizedlesystemchangestodetectmaliciousactivityinvolvingVMs.
However,itisdiculttoidentifyVMimagesaftertheyhavebeendistributedoutsideofanenterprisenetwork(e.
g.
,usingpeer-to-peerlesharingsoftware).
Anotherapproachistoimplementstrictaccesscontrolandcopycon-trolofVMimages.
However,thesecontrolsoftenhinderthelegitimateuseofVMs.
Therefore,itisnecessarytoaddresstwoissues:(i)identifyVMim-agesevenaftertheyhavebeenillegallydistributed;and(ii)facilitatelegitimateuseofVMimages.
DigitalwatermarkingofVMimagescanaddressboththeseissues.
However,aswediscussbelow,watermark-ingtechniquesusedforaudioandvideolesarenotapplicabletoVMimages.
Digitalwatermarkingtechnologiestypicallymodifyredundantorun-useddigitalcontent(e.
g.
,inaudiblefrequencyrangesforaudioles)toembedwatermarks.
Inthecaseofaudioandvideoles,modifyingtheoriginalinformationfordigitalwatermarkingproducesimperceptibleef-fectswhenplayingtheles[7].
Incontrast,modifyingaVMimagecancausebootfailureswhenthewatermarkedimageisexecuted.
Ad-ditionally,dataonthewatermarkedVMisfrequentlychangedbecauseofsoftwareupdates,logging,etc.
Unlikeanaudioorvideolewhosecontentisunchanged,aVMimageisessentiallyvariable;consequently,inordertoidentifytheVMimage,theimagehastobewatermarkedaftereverychange.
Datahidingtechniques[5]canbeemployedforwatermarkingVMimages.
Datacanbehiddeninvariouslocations:Areasmarkedasnotinusebythepartitiontable.
Extendedleattributessuchasalternatedatastreams.
Unusedportionsofthelastdataunitsofles(slackspace).
Reservedi-nodesthatarenotusedbytheoperatingsystem.
Portionsthatareexcludedduringconsistencycheckingofajour-nalinglesystem.
Fileshiddenviasteganographyusingspeciallesystemdrivers[6].
Amajordeciencyofexistingdatahidingtechniquesisthelackofplatform-independence:thetechniquesworkonspeciclesystems(e.
g.
,NTFS),operatingsystems(e.
g.
,RedHatLinux)andOSkernelversions(e.
g.
,Linux2.
2.
x).
Itisdicult,ifnotimpossible,toapplyTadano,etal.
259thesetechniquestoVMsinheterogeneousenvironmentswheremultiplelesystems,operatingsystemsandOSkernelversionsareused.
Toaddressthisissue,weproposeadigitalwatermarkingschemeforVMimagesthatisindependentoflesystems,leformats,operatingsystems,OSkernelversionsandhardware.
Theschemeembedsawa-termarkderivedfromthenamesofthelespresentinaVM.
2.
BasicConceptsOurdigitalwatermarkingschemeforVMimagesuseslenamesasawatermark,notthecontentsoftheles.
AuniqueidentieriscreatedforeachVMimageandawatermarkcorrespondingtotheidentierisembeddedintheformoflesinthelesystemoftheVMimage.
Theseembeddedlesarecalled"watermarkfragmentles.
"Ifthenamesofthewatermarkfragmentlesarerandomlycreated,theywouldbereadilydistinguishablefromthenamesofthepre-existinglesontheVM,enablinganattackertoidentifyandsubsequentlyre-movethewatermarkfragmentles.
Thus,thewatermarkingschememakesthefragmentlesdiculttodetectbycreatingfragmentleswithnamesthataresimilartopre-existinglesintheVMandembed-dingthelesinrandomdirectoriesintheVM.
AsecuredatabaseisusedtostoretheidentierofeachVMimageandthecorrespondingwatermarkfragmentles.
3.
DesignandImplementationThissectiondescribesthedesignandimplementationofthedigitalwatermarkingscheme.
3.
1SystemComponentsThesystemhasthreecomponents:(i)awatermarkgenerator;(ii)awatermarkdetector;and(iii)awatermarkinformationdatabase.
Figure1illustratesthewatermarkgenerationanddetectionprocesses.
WatermarkGenerator:ThewatermarkgeneratoremploysthenamesofthewatermarkfragmentlesasthewatermarkforaVMimage.
ItcreatesawatermarkedVMimagebyembeddingthewatermarkfragmentlesintheVMimageandstoresthegeneratedlenamesinthewatermarkinformationdatabase.
TheVMimagetobewatermarkediscreatedbycopyingthetemplateVMimagele.
SincethetemplateVMimagesareusedastheoriginaldataforwatermarking,theseimagesshouldbesecurelymanaged.
ThereasonisthatanattackerwhoobtainstheVMimagetemplate260ADVANCESINDIGITALFORENSICSVIIdentifierCertaintyWatermarkGenerationWatermarkDetectionWatermarkInformationDatabaseWatermarkGeneratorWatermarkDetectorWatermarkedVMImageVMImageTemplateWatermarkInformationDatabaseFigure1.
Watermarkgenerationanddetection.
wouldbeabletocomputethewatermarkfragmentlesasthedierencebetweenthetemplateVMimageandthewatermarkedVMimageles.
DetailsofthewatermarkgenerationalgorithmarepresentedinSection3.
2.
WatermarkedVMImageIDVMNameOwnerWatermarkFragmentFiles5ac8183d-e2cb-4ad2-a185-5c3beb0c17b8foo-desktopfoo/etc/yum/aaa.
conf,/var/log/dummy.
log42be8a40-5e6d-4677-84fb-e387f5638264bar-desktopbar/usr/local/bin/cmd,/etc/dummy.
conf…………WatermarkInformationDatabaseTableWatermarkFragmentFiles/etc/yum/aaa.
conf/var/log/dummy.
logID:5ac8183d-e2cb-4ad2-a185-5c3beb0c17b8Figure2.
Samplerecordsinthewatermarkinformationdatabase.
WatermarkInformationDatabase:Thewatermarkinforma-tiondatabase(WI-DB)storestheidentierofeachVMimageanditsattributes.
TheidentierforaVMimageisauniversallyuniqueidentier(UUID).
Theattributesincludethenamesofthewatermarkfragmentles,VMowner,etc.
(Figure2).
OnlyauthorizedusersshouldbepermittedtoreadandwriteWI-DBrecords.
Anattackerwithread/writeaccesscouldalterWI-DBrecordsoridentifyanddeletethewatermarkfragmentlesembeddedinaVMimage.
WatermarkDetector:ThewatermarkdetectoridentiesaVMusingthewatermarkfragmentlesembeddedinthetargetVMim-agebasedonWI-DBrecords.
WhenanunauthorizedleakofaVMimageissuspected,theadministratormayperformthedetectionprocesstoidentifytheVMimageanditsowner.
Tadano,etal.
261TargetVMImage/var//etc//usr//home//bin/…DirectoryTreeonVM1.
ObtainthenamesoftheWatermarkFragmentFiles2.
SearchthefilesintheVMImageIDVMNameOwnerWatermarkFragmentFiles5ac8183d-e2cb-4ad2-a185-5c3beb0c17b8foo-desktopfoo/etc/yum/aaa.
conf,/var/log/dummy.
log42be8a40-5e6d-4677-84fb-e387f5638264bar-desktopbar/usr/local/bin/cmd,/etc/dummy.
conf…………WatermarkInformationDatabaseTableID:unknownFigure3.
Watermarkdetection.
Figure3illustratesthedetectionprocess.
IftheidentierofthetargetVMcanbeguessed,thewatermarkgeneratorlooksupthecorrespondingWI-DBrecord.
Otherwise,thewatermarkdetectorcomparesthewatermarkfragmentlenamesinWI-DBrecordswiththoseinthetargetVMimage.
ThewatermarkgeneratorthenoutputsacertaintyvalueoftheidentierofthetargetVMimage.
ThecertaintyvalueiscomputedasthepercentageofthenamesofthewatermarkfragmentlesintheWI-DBrecordthatmatchlenamesintheVMimage.
Notethatsomewatermarkfragmentlesmayhavebeendeletedorrenamedonpurposeorbyaccident.
3.
2WatermarkGenerationAlgorithmThissectionbrieydescribestheprocessofgeneratingthewatermarkfragmentlesforthetargetVMimage.
Thealgorithmhasvesteps.
Step1:Inputtheparametersrequiredforwatermarkgeneration.
Step2:NumberthedirectoriesinthetargetVMimageindictio-naryorder.
Step3:Selectthedirectoriestoembedwatermarkfragmentles.
Step4:Generatethenamesofthewatermarkfragmentlestobecreated.
Step5:GeneratethecontentsofthewatermarkfragmentlesforthedirectoriesselectedinStep3.
262ADVANCESINDIGITALFORENSICSVITable1.
Directorycodelist.
NumberDirectoryName1/2/etc/3/etc/init.
d/4/etc/ldap/5/etc/skel/6/etc/ssh/7/etc/sysconfig/.
.
.
.
.
.
Step1(InputParametersforWatermarkGeneration):Thefollowinginputparametersarerequiredforwatermarkgeneration:NumberofWatermarkFragmentFiles:Thelargerthenum-berofwatermarkfragmentles,themoretamper-resistantisthewatermark.
However,thisincreasesthetimerequiredtogeneratewatermarkfragmentles.
ExcludedDirectories:Somedirectories(e.
g.
,temporarydirec-tories)shouldbeexcludedbecauselesinthesedirectorieschangefrequently.
ExcludedSuxes:Thesearesuxesthatshouldbeexcludedfromthenamesofthewatermarkfragmentles.
BitLength:ThebitlengthisaparameterusedbytheBlum-Blum-Shub(BBS)algorithm[4]togeneratecryptographically-sec-urepseudo-randomnumbers.
Thisparameteraectsthecomputa-tionaltimeandsecurity,andissetto1024bitsinourexperiments.
Step2(NumbertheDirectoriesintheTargetVMImage):ThewatermarkgeneratorsearchesallthedirectoriesinthetargetVMimagerecursivelyandgeneratesa"directorycodelist"(Table1).
TheexcludeddirectoriesidentiedinStep1arenotnumbered.
ThedirectorycodeofatemplateVMimagecanbereusedwhennewwatermarkedVMimagesarecreatedfromthesametemplateVMimagebecausetheyhavethesamedirectorytreestructure.
Thisreducestheprocessingtime.
Step3(SelectDirectoriestoEmbedWatermarkFragmentFiles):Thewatermarkgeneratorproducespseudo-randomnumbersforthewatermarkfragmentlesinputinStep1.
ThevaluesoftheTadano,etal.
263randomnumbersarelimitedtotherangeofdirectorycodes.
Thewa-termarkgeneratorextractsthenamesofdirectoriescorrespondingtothegeneratedrandomnumbersusingthedirectorycodelistgeneratedinStep2.
TheBBSpseudo-randomnumbergenerationalgorithmisusedtomaketherandomnumbersdicultforanattackertopredict.
Althoughthisalgorithmiscomputationallyintensive,theexperimentalresultspresentedinSection4.
2indicatethattheoverallperformanceofthewatermarkingschemeisacceptable.
Step4(GeneratetheNamesofWatermarkFragmentFiles):ThewatermarkgeneratorcreatesthenamesofthewatermarkfragmentlesthatareembeddedinthedirectoriesselectedinStep3.
Portionsofthenamesofpre-existinglesinthedirectoriesaremodiedtocreatelenamesthataresimilartothoseofthepre-existingles.
Alenameisgeneratedaccordingtothefollowingsteps.
Step4.
1:Getthenamesofexistinglesinthetargetdirectory.
Onlyregularles(notsubdirectories,hiddenles,etc.
)whosesuxesarenottobeexcludedareretrieved.
Step4.
2:Enumerateallthesubstringscorrespondingtothelenames.
Eachsubstringisobtainedfromthehead(i.
e.
,notinclud-ingthesux)ofalenameretrievedinStep4.
1.
Theresultofthisstepistheunionofsubstringsforallthelenames.
Forexam-ple,ifthetargetdirectoryhasalenamedabc.
txt,thepossiblesubstringsare:abc,abanda.
Step4.
3:Compute"similaritygroups"foreachextractedsub-string.
Asimilaritygroupisagroupoflesinthetargetdirectorythatmeetsthefollowingconditions:(i)thelenamestartswiththesubstring(prex)generatedinStep4.
2;(ii)alltheleshavethecommonsux(e.
g.
,.
txt);and(iii)asimilaritygroupcon-tainsatleasttwoles.
Forexample,iftherearevelesinatargetdirectory{s1.
txt,s2.
txt,s3.
dat,s4.
dat,s5.
conf}andsisthesubstring,thentwosimilaritygroupscanbecomputed:{s1.
txt,s2.
txt}and{s3.
dat,s4.
dat}.
Step4.
4:ComputetheDsimscoreforeachsimilaritygroup:Dsim=c1lp+c2nfc3ldwherelpisthelengthoftheprexofthesimilaritygroup;nfisthenumberoflesinthesimilaritygroup;ldisthemeanvalueofthedierencebetweenthelengthofthelename(excludingthe264ADVANCESINDIGITALFORENSICSVIsux)andlpinthesimilaritygroup;andc1,c2,c3areparametersthataresettoone.
ThesimilaritygroupwiththehighestDsimscoreiscalledthe"prototypelegroup.
"Step4.
5:Createthenameofthenewwatermarkfragmentle.
Oneormorerandomlettersareaddedtothetailoftheprexoftheselectedprototypelegroup.
Thelengthoftheaddedlet-ters(lt)isthelengthofthelenamerandomlyselectedfromtheprototypelegroup(excludingthesuxandprex).
Finally,thesuxofthelesintheprototypelegroupisaddedtothelename.
Forexample,iftheprexissampleandtheprototypelegroupis{sample.
dat,sample-bak.
dat}andifsample-bak.
datisselected,thenlt=4andapossiblenameissampledbha.
dat.
Step5(GeneratetheContentoftheWatermarkFragmentFiles):Thewatermarkgeneratorcreatesthecontentandattributescorrespondingtoeachwatermarkfragmentle.
Thecontentofawater-markfragmentleisarandomly-generatedbytesequence.
Attributesofawatermarkfragmentlearedeterminedaccordingtothefollowingrules.
Fortimestamps(creation/modication/access)andlesize,thewatermarkgeneratorassignsthemeanvaluesofthelesintheprototypelegrouptothenewwatermarkfragmentle.
Forotherattributessuchasownershipandpermission,thevaluescorrespondingtoarandomlyselectedleintheprototypelegroupareused.
3.
3ImplementationThedigitalwatermarkingschemewasimplementedinJava1.
5.
TheVMwareServervirtualizationsoftwarewasemployed.
Thecommandvmware-mount.
plwasissuedtotheVMwareServertomountthelesystemontheVMimageforembeddingwatermarkfragmentles.
TheVMimageofanylesystemoroperatingsystem,includingWindowsandLinux,canbewatermarked.
TheWI-DBwasimplementedusingMySQL5.
0.
4.
ExperimentalSetupandResultsThissectiondescribestheexperimentalsetupusedtoevaluatethewa-termarkingalgorithm.
Also,itpresentstheexperimentalresultsrelatedtowatermarkgenerationanddetection.
4.
1ExperimentalSetupAtestenvironmentwascreatedtoevaluatetheperformanceofthewatermarkingscheme.
Theenvironmentincludedonephysicalhost(Ta-Tadano,etal.
265Table2.
Testenvironment.
PhysicalHostCPUPentium41.
73GHzProcessorMemory1GBRAMHostOSUbuntuLinux8.
04ServerVMMVMwareServer2.
0GuestVMsGuestOSUbuntuLinux8.
04CentOS5.
1(JeOSedition)(default)VMImageSize183MB2,750MB(.
vmdkfile)Directories1,1207,429ble2).
TwotemplateVMimagesofdierentsizeswereusedtoclarifytheimpactofsizeonthewatermarkingscheme.
TheVMimagesusedwereanUbuntuLinux8.
04ServerJeOSedition(minimumcongurationforvirtualappliances)andadefaultinstallationofCentOS5.
1.
4.
2ExperimentalResultsThissectionpresentsourexperimentalresultsrelatedtowatermarkgenerationanddetection.
WatermarkGenerationTheVMimagetemplatesofUbuntuandCentOSwerecopiedandatotalof10and100watermarkfragmentleswereembeddedinthetwoVMimages.
Eachexperimentwasrepeated10timesandtheaverageturnaroundtimeswerecalculated.
Table3.
Turnaroundtimesforwatermarkgeneration.
Av.
GenerationTime(sec)Av.
Copying10Files100FilesTime(sec)UbuntuLinux8.
0413.
12124.
0016.
903CentOS5.
1168.
382177.
270142.
284Table3presentstheturnaroundtimesforcopyingVMimagesandgeneratingwatermarks.
Theexperimentsusedpreviously-createddirec-torycodesoftemplateVMimagesbecausethecodesaregeneratedonlythersttimethatthetemplateVMimagesareused.
Theresultsin-dicatethatthetimeforwatermarkgenerationexcludingthetimefor266ADVANCESINDIGITALFORENSICSVITable4.
Generatedwatermarkfragmentles.
FileNames/usr/share/zoneinfo/Pacific/kQGidyI/etc/console-tools/v2uQizvontwL8/lib/modules/2.
6.
24-16-virtual/kernel/sound/usb/snd-usb-INc.
ko/usr/lib/klibc/bin/hso.
shared/usr/lib/perl/5.
8.
8/IO/Socket/vS9jkE.
pm/usr/lib/python2.
5/wsgiref/hG272nT.
pyc/usr/share/debconf/jAGX7mQ.
sh/usr/share/zoneinfo/Mexico/irQ7KA/usr/share/zoneinfo/posix/Chile/5XwjAcopyingisessentiallyindependentofthesizeofthetemplateVMimage.
Theturnaroundtimesdropwhenfasterstoragedevicesareemployed.
Table4liststhegeneratedwatermarkfragmentles.
Thelenamessnd-usb-INc.
koandhso.
sharedarerelativelydiculttodistinguishfromthepre-existinglesinthetargetdirectories.
Incontrast,lenamessuchaskQGidyIareeasilydistinguishable.
Ingeneral,whentherearemanylesinthetargetdirectorywhosenameshavecommonextensionsandlongcommonsubstrings,thegeneratedlename(s)tendtobeindistinguishable.
Forexample,thelesnd-usb-INc.
kobelongsto/lib/modules/2.
6.
24-16-virtual/kernel/sound/usb/whosepre-existinglesaresnd-usb-audio.
koandsnd-usb-lib.
ko.
Meanwhile,ifonlyafewlenameshavecommonsubstrings/extensionsinthetargetdirec-tory,thegeneratedlename(s)tendtobecontrived.
WatermarkDetectionWatermarkdetectionexperimentswerecon-ductedtoidentify10and100watermarkfragmentlesfromthewater-markedUbuntu8.
04andCentOS5.
1VMimages.
Table5.
Turnaroundtimesforwatermarkdetection.
Av.
DetectionTime(sec)10Files100FilesUbuntuLinux8.
047.
5247.
549CentOS5.
17.
5267.
573Table5presentstheaverageturnaroundtimesforwatermarkdetec-tionbasedontenrepetitions.
Theresultsindicatethatthetimetakentodetectthewatermarkisalmostindependentofthesizeofthewater-markedVMimageandthenumberofwatermarkfragmentles.
Tadano,etal.
2675.
ConclusionsThedigitalwatermarkingschemeforVMimagesisindependentoflesystems,leformats,operatingsystems,kernelversionsandhardware.
Also,experimentsdemonstratethatwatermarkgenerationanddetectionarebothfastandeective.
Ourfutureworkwillfocusonenhancingthetamper-resistantcharac-teristicsofthewatermarkingscheme.
SeveralattackscouldbedevisedtoremoveormodifyVMimagewatermarks.
Forexample,watermarkscouldbedetectedusingamachinelearningalgorithmsuchtextcluster-ing[9]todiscriminateembeddedlesfrompre-existinglesbasedonlenamestringfeatures.
AnotherattackcoulduseinformationfromelsewhereintheVMsuchasthei-nodenumbersofles.
Filesinstalledatagiventimeareassignedsuccessivei-nodenumbers;alewithani-nodenumberthatisoutofsequencecouldcorrespondtoanembeddedle.
Otherproblemstobeinvestigatedincludehavingthecontentsofembeddedlesresemblethoseofpre-existingles,andaugmentingtheschemewithotherdatahidingapproachestoenhancetamperresistance.
Finally,ourresearchwillinvestigatetheapplicationofthewatermarkingschemetootherdigitalcontentsuchastarandziparchives.
References[1]AmazonWebServices,AmazonElasticComputeCloud,Seattle,Washington(aws.
amazon.
com/ec2).
[2]AmazonWebServices,AmazonSimpleStorageService,Seattle,Washington(s3.
amazonaws.
com).
[3]AmazonWebServices,ec2-download-bundle,Seattle,Wash-ington(docs.
amazonwebservices.
com/AmazonEC2/dg/2006-10-01/CLTRG-ami-download-bundle.
html).
[4]L.
Blum,M.
BlumandM.
Shub,Comparisonoftwopseudo-randomnumbergenerators,inAdvancesinCryptology:Proceed-ingsofCrypto1982,D.
Chaum,R.
RivestandA.
Sherman(Eds.
),Plenum,NewYork,pp.
61–78,1982.
[5]K.
EcksteinandM.
Jahnke,Datahidinginjournalinglesystems,ProceedingsoftheFifthAnnualDigitalForensicResearchWork-shop,2005.
[6]A.
McDonaldandM.
Kuhn,StegFS:AsteganographiclesystemforLinux,ProceedingsoftheThirdInternationalWorkshoponIn-formationHiding,pp.
463–477,2000.
268ADVANCESINDIGITALFORENSICSVI[7]F.
Perez-GonzalezandJ.
Hernandez,Atutorialondigitalwater-marking,ProceedingsoftheThirty-ThirdIEEEInternationalCar-nahanConferenceonSecurityTechnology,pp.
286–292,1999.
[8]N.
QuynhandY.
Takefuji,Anovelapproachforale-systemin-tegritymonitortoolforaXenvirtualmachine,ProceedingsoftheSecondACMSymposiumonInformation,ComputerandCommu-nicationsSecurity,pp.
194–202,2007.
[9]T.
Segaran,ProgrammingCollectiveIntelligence:BuildingSmartWeb2.
0Applications,O'Reilly,Sebastopol,California,2007.
搬瓦工怎么样?这几天收到搬瓦工发来的邮件,告知香港pccw机房(HKHK_1)即将关闭,这也不算是什么出乎意料的事情,反而他不关闭我倒觉得奇怪。因为目前搬瓦工香港cn2 GIA 机房和香港pccw机房价格、配置都一样,可以互相迁移,但是不管是速度还是延迟还是丢包率,搬瓦工香港PCCW机房都比不上香港cn2 gia 机房,所以不知道香港 PCCW 机房存在还有什么意义?关闭也是理所当然的事情。点击进...
Friendhosting商家在前面的篇幅中也又陆续介绍到,是一家保加利亚主机商,主要提供销售VPS和独立服务器出租业务,数据中心分布在:荷兰、保加利亚、立陶宛、捷克、乌克兰和美国洛杉矶等。这不近期黑色星期五活动,商家也有推出了黑五优惠,VPS全场一次性45折,虚拟主机4折,全球多机房可选,老用户续费可获9折加送1个月使用时长,VDS折后最低仅€14.53/年,有需要的可以看看。Friendhos...
物语云计算(MonogatariCloud)是一家成立于2016年的老牌国人商家,主营国内游戏高防独服业务,拥有多家机房资源,产品质量过硬,颇有一定口碑。本次带来的是美国圣何塞 Equinix 机房的高性能I9-10980XE大带宽VPS,去程CN2GIA回程AS9929,美国原生IP,支持解锁奈飞等应用,支持免费安装Windows系统。值得注意的是,物语云采用的虚拟化技术为Hyper-V,资源全...
amazonec2为你推荐
敬汉卿姓名被抢注身份证号码被别人抢注了12306帐号怎么办firetrap牛仔裤的四大品牌是那几个啊?嘀动网在炫动网买鞋怎么样,是真的吗同ip站点同ip站点很多有没有影响?www.522av.com现在怎样在手机上看AVwww.522av.com在白虎网站bhwz.com看电影要安装什么播放器?789se.comhttp://gv789.com/index.php这个网站可信吗?是真的还是假的!www.175qq.com求带名字的情侣网名!邯郸纠风网邯郸市信访局地址雀嘴鳝专家教下怎么才能饲养好一条雀鳝鱼?
网站空间申请 winhost omnis 中国智能物流骨干网 天互数据 绍兴电信 服务器监测 阿里云手机官网 网页加速 重庆服务器 789电视剧网 rewritecond 石家庄服务器 脚本大全 聚惠网 cdn加速技术 删除域名 赵 容 ddos攻击教程 更多