contentsamazonec2
amazonec2 时间:2021-03-26 阅读:(
)
Chapter18DIGITALWATERMARKINGOFVIRTUALMACHINEIMAGESKumikoTadano,MasahiroKawato,RyoFurukawa,FumioMachidaandYoshiharuMaenoAbstractThewidespreaduseofserveranddesktopvirtualizationtechnologiesincreasesthelikelihoodofunauthorizedanduncontrolleddistributionofvirtualmachine(VM)imagesthatcontainproprietarysoftware.
Thispaperattemptstoaddressthisissueusingaplatform-independentdig-italwatermarkingschemeapplicabletoavarietyofVMimages.
TheschemeembedsawatermarkintheformoflesinaVMimage;thewatermarkedVMimageisidentiedbasedontheembeddedles.
Toreducethepossibilityofdiscoverybyanattacker,thenamesoftheem-beddedlesareverysimilartothenamesofpre-existinglesintheVMimage.
Experimentsindicatethattheapproachisfastandaccu-rate,withaverageturnaroundtimesof24.
001secondsand7.
549secondsforwatermarkgenerationanddetection,respectively.
Keywords:Digitalwatermarking,virtualmachineimages1.
IntroductionInmodernenterprisecomputingthereisagrowingtrendtowardcon-solidatingvirtualmachines(VMs)intheserverandclientsidestoreducecostsandenhanceportabilityandsecurity.
SuchenvironmentsrequirethemeanstoexportVMimagestotestsoftwareandtobackupVMs.
Forexample,Amazon'sElasticComputeCloud[1]andSimpleStorageService[2]providethecommandec2-download-bundletodownloadVMimagesfromadatacentertolocalcomputers[3].
Unfortunately,thistechnologyalsofacilitatestheunauthorizeddisseminationofVMimagescontainingproprietarysoftware.
Oneapproachforaddressingthisissueistousehost-basedintru-siondetectionsystemssuchasTripWire,AIDEandXenFIT[8].
TheseK.
-P.
Chow,S.
Shenoi(Eds.
):AdvancesinDigitalForensicsVI,IFIPAICT337,pp.
257–268,2010.
cIFIPInternationalFederationforInformationProcessing2010258ADVANCESINDIGITALFORENSICSVIsystemsmonitorunauthorizedlesystemchangestodetectmaliciousactivityinvolvingVMs.
However,itisdiculttoidentifyVMimagesaftertheyhavebeendistributedoutsideofanenterprisenetwork(e.
g.
,usingpeer-to-peerlesharingsoftware).
Anotherapproachistoimplementstrictaccesscontrolandcopycon-trolofVMimages.
However,thesecontrolsoftenhinderthelegitimateuseofVMs.
Therefore,itisnecessarytoaddresstwoissues:(i)identifyVMim-agesevenaftertheyhavebeenillegallydistributed;and(ii)facilitatelegitimateuseofVMimages.
DigitalwatermarkingofVMimagescanaddressboththeseissues.
However,aswediscussbelow,watermark-ingtechniquesusedforaudioandvideolesarenotapplicabletoVMimages.
Digitalwatermarkingtechnologiestypicallymodifyredundantorun-useddigitalcontent(e.
g.
,inaudiblefrequencyrangesforaudioles)toembedwatermarks.
Inthecaseofaudioandvideoles,modifyingtheoriginalinformationfordigitalwatermarkingproducesimperceptibleef-fectswhenplayingtheles[7].
Incontrast,modifyingaVMimagecancausebootfailureswhenthewatermarkedimageisexecuted.
Ad-ditionally,dataonthewatermarkedVMisfrequentlychangedbecauseofsoftwareupdates,logging,etc.
Unlikeanaudioorvideolewhosecontentisunchanged,aVMimageisessentiallyvariable;consequently,inordertoidentifytheVMimage,theimagehastobewatermarkedaftereverychange.
Datahidingtechniques[5]canbeemployedforwatermarkingVMimages.
Datacanbehiddeninvariouslocations:Areasmarkedasnotinusebythepartitiontable.
Extendedleattributessuchasalternatedatastreams.
Unusedportionsofthelastdataunitsofles(slackspace).
Reservedi-nodesthatarenotusedbytheoperatingsystem.
Portionsthatareexcludedduringconsistencycheckingofajour-nalinglesystem.
Fileshiddenviasteganographyusingspeciallesystemdrivers[6].
Amajordeciencyofexistingdatahidingtechniquesisthelackofplatform-independence:thetechniquesworkonspeciclesystems(e.
g.
,NTFS),operatingsystems(e.
g.
,RedHatLinux)andOSkernelversions(e.
g.
,Linux2.
2.
x).
Itisdicult,ifnotimpossible,toapplyTadano,etal.
259thesetechniquestoVMsinheterogeneousenvironmentswheremultiplelesystems,operatingsystemsandOSkernelversionsareused.
Toaddressthisissue,weproposeadigitalwatermarkingschemeforVMimagesthatisindependentoflesystems,leformats,operatingsystems,OSkernelversionsandhardware.
Theschemeembedsawa-termarkderivedfromthenamesofthelespresentinaVM.
2.
BasicConceptsOurdigitalwatermarkingschemeforVMimagesuseslenamesasawatermark,notthecontentsoftheles.
AuniqueidentieriscreatedforeachVMimageandawatermarkcorrespondingtotheidentierisembeddedintheformoflesinthelesystemoftheVMimage.
Theseembeddedlesarecalled"watermarkfragmentles.
"Ifthenamesofthewatermarkfragmentlesarerandomlycreated,theywouldbereadilydistinguishablefromthenamesofthepre-existinglesontheVM,enablinganattackertoidentifyandsubsequentlyre-movethewatermarkfragmentles.
Thus,thewatermarkingschememakesthefragmentlesdiculttodetectbycreatingfragmentleswithnamesthataresimilartopre-existinglesintheVMandembed-dingthelesinrandomdirectoriesintheVM.
AsecuredatabaseisusedtostoretheidentierofeachVMimageandthecorrespondingwatermarkfragmentles.
3.
DesignandImplementationThissectiondescribesthedesignandimplementationofthedigitalwatermarkingscheme.
3.
1SystemComponentsThesystemhasthreecomponents:(i)awatermarkgenerator;(ii)awatermarkdetector;and(iii)awatermarkinformationdatabase.
Figure1illustratesthewatermarkgenerationanddetectionprocesses.
WatermarkGenerator:ThewatermarkgeneratoremploysthenamesofthewatermarkfragmentlesasthewatermarkforaVMimage.
ItcreatesawatermarkedVMimagebyembeddingthewatermarkfragmentlesintheVMimageandstoresthegeneratedlenamesinthewatermarkinformationdatabase.
TheVMimagetobewatermarkediscreatedbycopyingthetemplateVMimagele.
SincethetemplateVMimagesareusedastheoriginaldataforwatermarking,theseimagesshouldbesecurelymanaged.
ThereasonisthatanattackerwhoobtainstheVMimagetemplate260ADVANCESINDIGITALFORENSICSVIIdentifierCertaintyWatermarkGenerationWatermarkDetectionWatermarkInformationDatabaseWatermarkGeneratorWatermarkDetectorWatermarkedVMImageVMImageTemplateWatermarkInformationDatabaseFigure1.
Watermarkgenerationanddetection.
wouldbeabletocomputethewatermarkfragmentlesasthedierencebetweenthetemplateVMimageandthewatermarkedVMimageles.
DetailsofthewatermarkgenerationalgorithmarepresentedinSection3.
2.
WatermarkedVMImageIDVMNameOwnerWatermarkFragmentFiles5ac8183d-e2cb-4ad2-a185-5c3beb0c17b8foo-desktopfoo/etc/yum/aaa.
conf,/var/log/dummy.
log42be8a40-5e6d-4677-84fb-e387f5638264bar-desktopbar/usr/local/bin/cmd,/etc/dummy.
conf…………WatermarkInformationDatabaseTableWatermarkFragmentFiles/etc/yum/aaa.
conf/var/log/dummy.
logID:5ac8183d-e2cb-4ad2-a185-5c3beb0c17b8Figure2.
Samplerecordsinthewatermarkinformationdatabase.
WatermarkInformationDatabase:Thewatermarkinforma-tiondatabase(WI-DB)storestheidentierofeachVMimageanditsattributes.
TheidentierforaVMimageisauniversallyuniqueidentier(UUID).
Theattributesincludethenamesofthewatermarkfragmentles,VMowner,etc.
(Figure2).
OnlyauthorizedusersshouldbepermittedtoreadandwriteWI-DBrecords.
Anattackerwithread/writeaccesscouldalterWI-DBrecordsoridentifyanddeletethewatermarkfragmentlesembeddedinaVMimage.
WatermarkDetector:ThewatermarkdetectoridentiesaVMusingthewatermarkfragmentlesembeddedinthetargetVMim-agebasedonWI-DBrecords.
WhenanunauthorizedleakofaVMimageissuspected,theadministratormayperformthedetectionprocesstoidentifytheVMimageanditsowner.
Tadano,etal.
261TargetVMImage/var//etc//usr//home//bin/…DirectoryTreeonVM1.
ObtainthenamesoftheWatermarkFragmentFiles2.
SearchthefilesintheVMImageIDVMNameOwnerWatermarkFragmentFiles5ac8183d-e2cb-4ad2-a185-5c3beb0c17b8foo-desktopfoo/etc/yum/aaa.
conf,/var/log/dummy.
log42be8a40-5e6d-4677-84fb-e387f5638264bar-desktopbar/usr/local/bin/cmd,/etc/dummy.
conf…………WatermarkInformationDatabaseTableID:unknownFigure3.
Watermarkdetection.
Figure3illustratesthedetectionprocess.
IftheidentierofthetargetVMcanbeguessed,thewatermarkgeneratorlooksupthecorrespondingWI-DBrecord.
Otherwise,thewatermarkdetectorcomparesthewatermarkfragmentlenamesinWI-DBrecordswiththoseinthetargetVMimage.
ThewatermarkgeneratorthenoutputsacertaintyvalueoftheidentierofthetargetVMimage.
ThecertaintyvalueiscomputedasthepercentageofthenamesofthewatermarkfragmentlesintheWI-DBrecordthatmatchlenamesintheVMimage.
Notethatsomewatermarkfragmentlesmayhavebeendeletedorrenamedonpurposeorbyaccident.
3.
2WatermarkGenerationAlgorithmThissectionbrieydescribestheprocessofgeneratingthewatermarkfragmentlesforthetargetVMimage.
Thealgorithmhasvesteps.
Step1:Inputtheparametersrequiredforwatermarkgeneration.
Step2:NumberthedirectoriesinthetargetVMimageindictio-naryorder.
Step3:Selectthedirectoriestoembedwatermarkfragmentles.
Step4:Generatethenamesofthewatermarkfragmentlestobecreated.
Step5:GeneratethecontentsofthewatermarkfragmentlesforthedirectoriesselectedinStep3.
262ADVANCESINDIGITALFORENSICSVITable1.
Directorycodelist.
NumberDirectoryName1/2/etc/3/etc/init.
d/4/etc/ldap/5/etc/skel/6/etc/ssh/7/etc/sysconfig/.
.
.
.
.
.
Step1(InputParametersforWatermarkGeneration):Thefollowinginputparametersarerequiredforwatermarkgeneration:NumberofWatermarkFragmentFiles:Thelargerthenum-berofwatermarkfragmentles,themoretamper-resistantisthewatermark.
However,thisincreasesthetimerequiredtogeneratewatermarkfragmentles.
ExcludedDirectories:Somedirectories(e.
g.
,temporarydirec-tories)shouldbeexcludedbecauselesinthesedirectorieschangefrequently.
ExcludedSuxes:Thesearesuxesthatshouldbeexcludedfromthenamesofthewatermarkfragmentles.
BitLength:ThebitlengthisaparameterusedbytheBlum-Blum-Shub(BBS)algorithm[4]togeneratecryptographically-sec-urepseudo-randomnumbers.
Thisparameteraectsthecomputa-tionaltimeandsecurity,andissetto1024bitsinourexperiments.
Step2(NumbertheDirectoriesintheTargetVMImage):ThewatermarkgeneratorsearchesallthedirectoriesinthetargetVMimagerecursivelyandgeneratesa"directorycodelist"(Table1).
TheexcludeddirectoriesidentiedinStep1arenotnumbered.
ThedirectorycodeofatemplateVMimagecanbereusedwhennewwatermarkedVMimagesarecreatedfromthesametemplateVMimagebecausetheyhavethesamedirectorytreestructure.
Thisreducestheprocessingtime.
Step3(SelectDirectoriestoEmbedWatermarkFragmentFiles):Thewatermarkgeneratorproducespseudo-randomnumbersforthewatermarkfragmentlesinputinStep1.
ThevaluesoftheTadano,etal.
263randomnumbersarelimitedtotherangeofdirectorycodes.
Thewa-termarkgeneratorextractsthenamesofdirectoriescorrespondingtothegeneratedrandomnumbersusingthedirectorycodelistgeneratedinStep2.
TheBBSpseudo-randomnumbergenerationalgorithmisusedtomaketherandomnumbersdicultforanattackertopredict.
Althoughthisalgorithmiscomputationallyintensive,theexperimentalresultspresentedinSection4.
2indicatethattheoverallperformanceofthewatermarkingschemeisacceptable.
Step4(GeneratetheNamesofWatermarkFragmentFiles):ThewatermarkgeneratorcreatesthenamesofthewatermarkfragmentlesthatareembeddedinthedirectoriesselectedinStep3.
Portionsofthenamesofpre-existinglesinthedirectoriesaremodiedtocreatelenamesthataresimilartothoseofthepre-existingles.
Alenameisgeneratedaccordingtothefollowingsteps.
Step4.
1:Getthenamesofexistinglesinthetargetdirectory.
Onlyregularles(notsubdirectories,hiddenles,etc.
)whosesuxesarenottobeexcludedareretrieved.
Step4.
2:Enumerateallthesubstringscorrespondingtothelenames.
Eachsubstringisobtainedfromthehead(i.
e.
,notinclud-ingthesux)ofalenameretrievedinStep4.
1.
Theresultofthisstepistheunionofsubstringsforallthelenames.
Forexam-ple,ifthetargetdirectoryhasalenamedabc.
txt,thepossiblesubstringsare:abc,abanda.
Step4.
3:Compute"similaritygroups"foreachextractedsub-string.
Asimilaritygroupisagroupoflesinthetargetdirectorythatmeetsthefollowingconditions:(i)thelenamestartswiththesubstring(prex)generatedinStep4.
2;(ii)alltheleshavethecommonsux(e.
g.
,.
txt);and(iii)asimilaritygroupcon-tainsatleasttwoles.
Forexample,iftherearevelesinatargetdirectory{s1.
txt,s2.
txt,s3.
dat,s4.
dat,s5.
conf}andsisthesubstring,thentwosimilaritygroupscanbecomputed:{s1.
txt,s2.
txt}and{s3.
dat,s4.
dat}.
Step4.
4:ComputetheDsimscoreforeachsimilaritygroup:Dsim=c1lp+c2nfc3ldwherelpisthelengthoftheprexofthesimilaritygroup;nfisthenumberoflesinthesimilaritygroup;ldisthemeanvalueofthedierencebetweenthelengthofthelename(excludingthe264ADVANCESINDIGITALFORENSICSVIsux)andlpinthesimilaritygroup;andc1,c2,c3areparametersthataresettoone.
ThesimilaritygroupwiththehighestDsimscoreiscalledthe"prototypelegroup.
"Step4.
5:Createthenameofthenewwatermarkfragmentle.
Oneormorerandomlettersareaddedtothetailoftheprexoftheselectedprototypelegroup.
Thelengthoftheaddedlet-ters(lt)isthelengthofthelenamerandomlyselectedfromtheprototypelegroup(excludingthesuxandprex).
Finally,thesuxofthelesintheprototypelegroupisaddedtothelename.
Forexample,iftheprexissampleandtheprototypelegroupis{sample.
dat,sample-bak.
dat}andifsample-bak.
datisselected,thenlt=4andapossiblenameissampledbha.
dat.
Step5(GeneratetheContentoftheWatermarkFragmentFiles):Thewatermarkgeneratorcreatesthecontentandattributescorrespondingtoeachwatermarkfragmentle.
Thecontentofawater-markfragmentleisarandomly-generatedbytesequence.
Attributesofawatermarkfragmentlearedeterminedaccordingtothefollowingrules.
Fortimestamps(creation/modication/access)andlesize,thewatermarkgeneratorassignsthemeanvaluesofthelesintheprototypelegrouptothenewwatermarkfragmentle.
Forotherattributessuchasownershipandpermission,thevaluescorrespondingtoarandomlyselectedleintheprototypelegroupareused.
3.
3ImplementationThedigitalwatermarkingschemewasimplementedinJava1.
5.
TheVMwareServervirtualizationsoftwarewasemployed.
Thecommandvmware-mount.
plwasissuedtotheVMwareServertomountthelesystemontheVMimageforembeddingwatermarkfragmentles.
TheVMimageofanylesystemoroperatingsystem,includingWindowsandLinux,canbewatermarked.
TheWI-DBwasimplementedusingMySQL5.
0.
4.
ExperimentalSetupandResultsThissectiondescribestheexperimentalsetupusedtoevaluatethewa-termarkingalgorithm.
Also,itpresentstheexperimentalresultsrelatedtowatermarkgenerationanddetection.
4.
1ExperimentalSetupAtestenvironmentwascreatedtoevaluatetheperformanceofthewatermarkingscheme.
Theenvironmentincludedonephysicalhost(Ta-Tadano,etal.
265Table2.
Testenvironment.
PhysicalHostCPUPentium41.
73GHzProcessorMemory1GBRAMHostOSUbuntuLinux8.
04ServerVMMVMwareServer2.
0GuestVMsGuestOSUbuntuLinux8.
04CentOS5.
1(JeOSedition)(default)VMImageSize183MB2,750MB(.
vmdkfile)Directories1,1207,429ble2).
TwotemplateVMimagesofdierentsizeswereusedtoclarifytheimpactofsizeonthewatermarkingscheme.
TheVMimagesusedwereanUbuntuLinux8.
04ServerJeOSedition(minimumcongurationforvirtualappliances)andadefaultinstallationofCentOS5.
1.
4.
2ExperimentalResultsThissectionpresentsourexperimentalresultsrelatedtowatermarkgenerationanddetection.
WatermarkGenerationTheVMimagetemplatesofUbuntuandCentOSwerecopiedandatotalof10and100watermarkfragmentleswereembeddedinthetwoVMimages.
Eachexperimentwasrepeated10timesandtheaverageturnaroundtimeswerecalculated.
Table3.
Turnaroundtimesforwatermarkgeneration.
Av.
GenerationTime(sec)Av.
Copying10Files100FilesTime(sec)UbuntuLinux8.
0413.
12124.
0016.
903CentOS5.
1168.
382177.
270142.
284Table3presentstheturnaroundtimesforcopyingVMimagesandgeneratingwatermarks.
Theexperimentsusedpreviously-createddirec-torycodesoftemplateVMimagesbecausethecodesaregeneratedonlythersttimethatthetemplateVMimagesareused.
Theresultsin-dicatethatthetimeforwatermarkgenerationexcludingthetimefor266ADVANCESINDIGITALFORENSICSVITable4.
Generatedwatermarkfragmentles.
FileNames/usr/share/zoneinfo/Pacific/kQGidyI/etc/console-tools/v2uQizvontwL8/lib/modules/2.
6.
24-16-virtual/kernel/sound/usb/snd-usb-INc.
ko/usr/lib/klibc/bin/hso.
shared/usr/lib/perl/5.
8.
8/IO/Socket/vS9jkE.
pm/usr/lib/python2.
5/wsgiref/hG272nT.
pyc/usr/share/debconf/jAGX7mQ.
sh/usr/share/zoneinfo/Mexico/irQ7KA/usr/share/zoneinfo/posix/Chile/5XwjAcopyingisessentiallyindependentofthesizeofthetemplateVMimage.
Theturnaroundtimesdropwhenfasterstoragedevicesareemployed.
Table4liststhegeneratedwatermarkfragmentles.
Thelenamessnd-usb-INc.
koandhso.
sharedarerelativelydiculttodistinguishfromthepre-existinglesinthetargetdirectories.
Incontrast,lenamessuchaskQGidyIareeasilydistinguishable.
Ingeneral,whentherearemanylesinthetargetdirectorywhosenameshavecommonextensionsandlongcommonsubstrings,thegeneratedlename(s)tendtobeindistinguishable.
Forexample,thelesnd-usb-INc.
kobelongsto/lib/modules/2.
6.
24-16-virtual/kernel/sound/usb/whosepre-existinglesaresnd-usb-audio.
koandsnd-usb-lib.
ko.
Meanwhile,ifonlyafewlenameshavecommonsubstrings/extensionsinthetargetdirec-tory,thegeneratedlename(s)tendtobecontrived.
WatermarkDetectionWatermarkdetectionexperimentswerecon-ductedtoidentify10and100watermarkfragmentlesfromthewater-markedUbuntu8.
04andCentOS5.
1VMimages.
Table5.
Turnaroundtimesforwatermarkdetection.
Av.
DetectionTime(sec)10Files100FilesUbuntuLinux8.
047.
5247.
549CentOS5.
17.
5267.
573Table5presentstheaverageturnaroundtimesforwatermarkdetec-tionbasedontenrepetitions.
Theresultsindicatethatthetimetakentodetectthewatermarkisalmostindependentofthesizeofthewater-markedVMimageandthenumberofwatermarkfragmentles.
Tadano,etal.
2675.
ConclusionsThedigitalwatermarkingschemeforVMimagesisindependentoflesystems,leformats,operatingsystems,kernelversionsandhardware.
Also,experimentsdemonstratethatwatermarkgenerationanddetectionarebothfastandeective.
Ourfutureworkwillfocusonenhancingthetamper-resistantcharac-teristicsofthewatermarkingscheme.
SeveralattackscouldbedevisedtoremoveormodifyVMimagewatermarks.
Forexample,watermarkscouldbedetectedusingamachinelearningalgorithmsuchtextcluster-ing[9]todiscriminateembeddedlesfrompre-existinglesbasedonlenamestringfeatures.
AnotherattackcoulduseinformationfromelsewhereintheVMsuchasthei-nodenumbersofles.
Filesinstalledatagiventimeareassignedsuccessivei-nodenumbers;alewithani-nodenumberthatisoutofsequencecouldcorrespondtoanembeddedle.
Otherproblemstobeinvestigatedincludehavingthecontentsofembeddedlesresemblethoseofpre-existingles,andaugmentingtheschemewithotherdatahidingapproachestoenhancetamperresistance.
Finally,ourresearchwillinvestigatetheapplicationofthewatermarkingschemetootherdigitalcontentsuchastarandziparchives.
References[1]AmazonWebServices,AmazonElasticComputeCloud,Seattle,Washington(aws.
amazon.
com/ec2).
[2]AmazonWebServices,AmazonSimpleStorageService,Seattle,Washington(s3.
amazonaws.
com).
[3]AmazonWebServices,ec2-download-bundle,Seattle,Wash-ington(docs.
amazonwebservices.
com/AmazonEC2/dg/2006-10-01/CLTRG-ami-download-bundle.
html).
[4]L.
Blum,M.
BlumandM.
Shub,Comparisonoftwopseudo-randomnumbergenerators,inAdvancesinCryptology:Proceed-ingsofCrypto1982,D.
Chaum,R.
RivestandA.
Sherman(Eds.
),Plenum,NewYork,pp.
61–78,1982.
[5]K.
EcksteinandM.
Jahnke,Datahidinginjournalinglesystems,ProceedingsoftheFifthAnnualDigitalForensicResearchWork-shop,2005.
[6]A.
McDonaldandM.
Kuhn,StegFS:AsteganographiclesystemforLinux,ProceedingsoftheThirdInternationalWorkshoponIn-formationHiding,pp.
463–477,2000.
268ADVANCESINDIGITALFORENSICSVI[7]F.
Perez-GonzalezandJ.
Hernandez,Atutorialondigitalwater-marking,ProceedingsoftheThirty-ThirdIEEEInternationalCar-nahanConferenceonSecurityTechnology,pp.
286–292,1999.
[8]N.
QuynhandY.
Takefuji,Anovelapproachforale-systemin-tegritymonitortoolforaXenvirtualmachine,ProceedingsoftheSecondACMSymposiumonInformation,ComputerandCommu-nicationsSecurity,pp.
194–202,2007.
[9]T.
Segaran,ProgrammingCollectiveIntelligence:BuildingSmartWeb2.
0Applications,O'Reilly,Sebastopol,California,2007.
如今我们很多朋友做网站都比较多的采用站群模式,但是用站群模式我们很多人都知道要拆分到不同IP段。比如我们会选择不同的服务商,不同的机房,至少和我们每个服务器的IP地址差异化。于是,我们很多朋友会选择美国多IP站群VPS商家的产品。美国站群VPS主机商和我们普通的云服务器、VPS还是有区别的,比如站群服务器的IP分布情况,配置技术难度,以及我们成本是比普通的高,商家选择要靠谱的。我们在选择美国多IP...
ZJI又上新了!商家是原Wordpress圈知名主机商:维翔主机,成立于2011年,2018年9月启用新域名ZJI,提供中国香港、台湾、日本、美国独立服务器(自营/数据中心直营)租用及VDS、虚拟主机空间、域名注册等业务。本次商家新上韩国BGP+CN2线路服务器,国内三网访问速度优秀,适用8折优惠码,优惠后韩国服务器最低每月440元起。韩国一型CPU:Intel 2×E5-2620 十二核二十四线...
有一段时间没有分享Gcore(gcorelabs)的信息了,这是一家成立于2011年的国外主机商,总部位于卢森堡,主要提供VPS主机和独立服务器租用等,数据中心包括俄罗斯、美国、日本、韩国、新加坡、荷兰、中国(香港)等多个国家和地区的十几个机房,商家针对不同系列的产品分为不同管理系统,比如VPS(Hosting)、Cloud等都是独立的用户中心体系,部落分享的主要是商家的Hosting(Virtu...
amazonec2为你推荐
易烊千玺弟弟创魔方世界纪录王俊凯.易烊千玺编舞吉尼斯记录沙滩捡12块石头价值近百万朋友从内蒙古阿拉善那边的戈壁捡了很多石头,求大神们鉴定一下,据说那边产玛瑙。谢谢大神们,大大的悬赏permissiondeniedpermission denied 怎么解决硬盘工作原理硬盘跟光盘的工作原理?www.kknnn.com求有颜色的网站!要免费的javbibinobibi的中文意思是?广告法新广告法哪些广告词不能用,广告违禁词大全33tutu.comDnf绝望100鬼泣怎么过www.1diaocha.com手机网赚是真的吗www.cn12365.orgwww.12365china.net是可靠的网站吗?还是骗子拿出来忽悠人的
国外vps租用 photonvps 光棍节日志 lamp配置 铁通流量查询 卡巴斯基永久免费版 天互数据 柚子舍官网 100m独享 1g空间 免费dns解析 东莞服务器 如何建立邮箱 安徽双线服务器 根服务器 web服务器搭建 google台湾 英雄联盟台服官网 东莞服务器托管 独立主机 更多