期刊文献+

基于云计算平台的防御拒绝服务攻击方法 被引量:2

Defense Strategy of Denial of Service Attacks Based on Cloud Computing Platform
下载PDF
导出
摘要 随着企业的关键核心数据及服务从企业网迁移到了云服务中心,更多的应用和集成业务开始依靠互联网,拒绝服务带来的后果和破坏将会明显地超过传统的企业网环境。在云计算环境下,具体的应用成为攻击目标,攻击者会使用针对具体应用的攻击方法来攻击受害者的在线服务。文章提出了一种基于云计算平台的处理拒绝服务攻击的策略,主要解决了在云计算平台上对具体应用进行HTTP拒绝服务攻击的问题。通过该策略,能够在即使黑客伪装为合法用户后仍然能够防御拒绝服务攻击。 Recently, the cloud computing became more and more popular for its high-performance computing, high availability, low cost. As the key core data and services of the enterprise migrated from enterprise network to the center of the cloud service, more applications and integration business started to rely on the Internet, so the conse- quences and damage of denial of service will be significantly more than the traditional enterprise network environment. In the cloud computing environment, the attacker will attack the victim's online services by targeting the specific applica- tion. The paper proposed the treatment strategy of denial of service attacks based on a cloud computing platform, mainly to solve specific application on the HTTP denial of service attacks. Through this strategy, even if the attacker can pre- tend to be legitimate users, it will be still able to defensive denial of service attacks.
出处 《信息化研究》 2011年第5期67-70,共4页 INFORMATIZATION RESEARCH
基金 中国博士后科学基金面上资助第48批一等资助(20100480048) 河南省科技攻关项目基金(072102210044 102102210489)
关键词 云计算 拒绝服务 防御策略 cloud computing denial of service defense strategy
  • 相关文献

参考文献5

  • 1维基百科.Cloudcomputing[EB/OL].(2009-01-10)[2009-03-10].http://en.wikipedia.org/wiki/Cloud—computing.
  • 2Vaquero Luis M; Rodero-Merino Luis, et al. A break in the clouds : Towards a cloud definition [ J ]. Computer Communica- tion Review,2009,39( 1 ) :50 - 55.
  • 3Aymerich F M, Fenu G, Surcis S. An Approach to a cloud com- puting network [ C ]//2008 First International Conference on Applications of Digital Information and Web Technologies. IEEE. Czech Republic:Technical University of Ostrava,2008: 113-118.
  • 4Liu Wentao. Research on DoS attack and detection program- ming[ C ]//Proceedings of the 3rd International Conference. Nanchang, China, 2009 : 207 - 210.
  • 5Ahsan Habib, Debashish Roy. Steps to defend against DoS at tacks [ J ]. Computers and Information Technology, Sylhet, Ban- gladesh, 2009 : 614 - 619.

同被引文献36

  • 1Brian Hayes.Cloud computing[J]. Communications of the ACM . 2008 (7)
  • 2Mohammad Alizadeh,Albert Greenberg,David A. Maltz,Jitendra Padhye,Parveen Patel,Balaji Prabhakar,Sudipta Sengupta,Murari Sridharan.??Data center TCP (DCTCP)(J)ACM SIGCOMM Computer Communication Review . 2010 (4)
  • 3Luo, J,Yang, X,Wang, J. et al.On a Mathematical Model for Low-Rate Shrew DDoS. IEEE Transactions on Information Forensics and Security . 2014
  • 4Yajuan, T,Xiapu, L,Qing, H. et al.Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks. IEEE Transactions on Information Forensics and Security . 2014
  • 5Bedi HS,Shiva S.Securing cloud infrastructure against co-resident Do S attacks using game theoretic defense mechanisms. Proceedings of the International Conference on Advances in Computing Communications and Informatics . 2012
  • 6A D Keromytis,V Misra,D Rubenstein.SOS: An Architecture for Mitigating DDoS Attacks. IEEE Journal on Selected Areas in Communications . 2004
  • 7T.Ristenpart,E.Tromer,H.Shacham.exploring informa-tion leakage in third-party compute clodus. Proceedings ofthe 16th ACM conference on computer and communications se-curity . 2009
  • 8Joshi B,Vijayan A S,Joshi B K.Securing Cloud Computing Environment Against DDoS Attacks. ICCCI . 2012
  • 9Hong Cheng,Zhang Min,Feng Dengguo.AB-ACCS:a cryptographic access control scheme for cloud storage. Journal of Computer Research and Development . 2010
  • 10Dan Rubenstein,Jim Kurose,Don Towsley.??Detecting shared congestion of flows via end-to-end measurement(J)IEEE/ACM Transactions on Networking (TON) . 2002 (3)

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部