期刊文献+

基于云计算的深度包检测技术研究 被引量:2

Research of deep packet inspection based on cloud computing
下载PDF
导出
摘要 针对云计算平台的分布式、虚拟化等特点,从深度包检测技术的算法原理和实现框架两方面入手,研究如何将深度包检测技术引入云计算平台,提出深度包检测系统在云计算环境中的系统框架;其根据云后台硬件资源的异构性来智能地协调配置,并协作均衡处理和防御重复攻击,提高了整体效率;实验结果表明云计算框架比传统框架的深度包检测系统有效性和在时间、空间上的性能优势。 Considering the special requirements and unique characteristics of cloud computing such as distributed computing and virtualization.This paper studies on how to apply DPI on cloud computing platform,based on the algorithm theory and implementation framework,and an intelligent cloud-cooperation framework of DPI is designed.The overall efficiency is improved since it coordinates configuration intelligently according to diversity of resources in the back end of cloud computing system and provides a scheduler for cooperative processing and defenses of repeated assaults.By comparing our design with traditional framework in virtual cloud computing platform,we prove the advantages of cloud computing framework on space and time performance are proved.
作者 杨锋
出处 《电子设计工程》 2011年第22期104-107,共4页 Electronic Design Engineering
关键词 云计算 云安全 深度包检测 分布式 cloud computing cloud security deep packet inspection distributed computing
  • 相关文献

参考文献5

  • 1Armbrust M,Fox A,Griffith R,et al.Above the clouds:aberkeley view of cloud computing[]..2009
  • 2Cong W,Qian W,Kui R,et al.Ensuring data storagesecurity in Cloud Computing[].th International Workshopon Quality of Service.2009
  • 3Lin P C,Lin YD,Lai YC.Using string matching for deeppacket inspection[].Computer Practices.2008
  • 4Vaquero L M,Rodero-Merino L,Caceres J,et al.A breakin the clouds:towards a cloud definition[].ACM SIGCOMM.2009
  • 5Leavitt N.Is Cloud Computing Really Ready for Pri me Ti me-[].IEEE Computer.2009

同被引文献16

  • 1Snort[EB/OL]. (2014-6-29)[2014-7-2]. https://www.snort.org/.
  • 2Wireshak[EB/OL].(2014-6-12)[2014-7-2]. http://www. wireshark.org/.
  • 3CAIDA CoralReef Software Suit[EB/OL]. (2014-4-3)[2014- 7-2]. http://www.caida.org/toois/measurement/coraireef/.
  • 4WHITE T. Hadoop: The definitive guide[M]. O' R e ill y Media. Inc. 2012.
  • 5Lee Y, Kang W, Son H. An internet traffic analysis method with mapreduce[C]//Network operations and management symposium wo-rkshops (NOMS Wksps), 2010 IEEE/IFIP. IEEE. 2010:357-361.
  • 6阅读网排名[EB/OL].(2012-2-17)[2014-7-2].http://wwwnewhua.com/2012/0217/146083.shtml.
  • 7LEE Y, LEE Y. Toward scalable internet traffic measurement and analysis with hadoop[J]. ACM SIGCOMM Computer CommunicationReview, 2013, 43(1 ): 5-13.
  • 8於时才,安凌鹏.协议分析与深度包检测相结合的入侵防御系统[J].微计算机信息,2009,25(21):67-69. 被引量:5
  • 9詹恒飞,杨岳湘,方宏.Nutch分布式网络爬虫研究与优化[J].计算机科学与探索,2011,5(1):68-74. 被引量:21
  • 10赵彤霞,杨洋.大学生网络阅读分析及阅读习惯的培养[J].文教资料,2011(16):218-219. 被引量:2

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部