期刊文献+

云计算中基于SAPA的DoS攻击防御方法 被引量:5

SAPA-based approach for defending DoS attacks in cloud computing
下载PDF
导出
摘要 拒绝服务(DoS,denial of service)攻击是云计算平台面临的主要安全威胁之一。安全访问路径算法(SAPA,security access path algorithm)通过节点路由表(NRT,node route table)合成安全路径,简化了传统安全覆盖网服务(SOS,secure overlay services)的角色节点,并采用周期性更新角色节点以及缓存安全访问路径的策略。SAPA更适用于云计算平台防御DoS攻击。基于云计算泛联路由架构,建立SAPA的数学模型并对其性能进行理论分析。通过OMNe T++实验平台测试SAPA的性能,并将实验场景扩展到Test-bed平台来评估SAPA对DoS攻击的防御效果。实验结果表明,相较于SOS方法,SAPA能够更有效地降低DoS攻击对通信成功率的影响,并保证足够小的访问延时。 Denial of service(DoS) attack was one of the major threats to cloud computing. Security access path algorithm(SAPA) used node route table(NRT) to compose security access path. It simplified role nodes of traditional secure overlay services(SOS), and periodically updated role nodes, and cached security access paths. Therefore, SAPA was more appropriate for cloud computing to defend DoS attacks. Based on the turn routing architecture of cloud computing, the mathematical model of SAPA was built and its performance was analyzed in theory. The performance of SAPA was tested in OMNe T++ experimental platform. Also, the Test-bed experiments were performed to evaluate the effectiveness of SAPA for defending DoS attack. Experimental results show that comparing with SOS, SAPA can degrade the impact of communication success rate caused by DoS attack effectively, and guarantees the access delay small enough.
作者 岳猛 李坤 吴志军 YUE Meng LI Kun WU Zhi-jun(School of Electronic Information and Automation, Civil Aviation University of China, Tianjin 300300, Chin)
出处 《通信学报》 EI CSCD 北大核心 2017年第4期129-139,共11页 Journal on Communications
基金 国家自然科学基金资助项目(No.61601467 No.U1533107 No.U1433105) 中央高校基本科研业务费基金资助项目(No.3122016D005)~~
关键词 云计算 DOS攻击 安全访问路径算法 防御 cloud computing DoS attack secure access path algorithm defense
  • 相关文献

参考文献3

二级参考文献18

  • 1维基百科.Cloudcomputing[EB/OL].(2009-01-10)[2009-03-10].http://en.wikipedia.org/wiki/Cloud—computing.
  • 2Vaquero Luis M; Rodero-Merino Luis, et al. A break in the clouds : Towards a cloud definition [ J ]. Computer Communica- tion Review,2009,39( 1 ) :50 - 55.
  • 3Aymerich F M, Fenu G, Surcis S. An Approach to a cloud com- puting network [ C ]//2008 First International Conference on Applications of Digital Information and Web Technologies. IEEE. Czech Republic:Technical University of Ostrava,2008: 113-118.
  • 4Liu Wentao. Research on DoS attack and detection program- ming[ C ]//Proceedings of the 3rd International Conference. Nanchang, China, 2009 : 207 - 210.
  • 5Ahsan Habib, Debashish Roy. Steps to defend against DoS at tacks [ J ]. Computers and Information Technology, Sylhet, Ban- gladesh, 2009 : 614 - 619.
  • 6赵永利,张杰.OMNET++与网络仿真[M].北京:人民邮电出版社,2012.
  • 7KEROMYTIS A D, MISRA V, RUBENSTEIN D. SOS: an architec- ture for mitigating DDoS attacks[J]. IEEE Journal on Selected Areas in Communications, 2004, 22(1): 176-187.
  • 8STAVROU A, KEROMYTIS A D. Countering DoS attacks with state- less multipath overlays[A]. Proceedings of the 12th ACM Conference on Computer and Communications Security CCS '05[C]. Alexandria, V'trginia, USA, 2005. 249-259.
  • 9XUAN D, CHELLAPPAN S, WANG X, et al. Analyzing the secure overlay services architecture under intelligent DDoS attacks[A]. Pro- ceedings of the 24th International Conference on Distributed Comput- ing Systems[C]. Tokyo Japan, 2004.408-417.
  • 10WANG X, CHELLAPPAN S, BOYER P, et al. On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks[J]. IEEE Transactions on Parallel and Distributed Systems,2006,17(7):619-632.

共引文献30

同被引文献43

引证文献5

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部