期刊文献+

云环境下一种基于信任的加密流量DDoS发现方法 被引量:6

A Trust-Based DDoS Discovery Approach for Encrypted Traffic in Cloud Environment
下载PDF
导出
摘要 针对云环境下分布式拒绝服务(distributed denial-of-service,DDoS)攻击加密攻击流量隐蔽性更强、更容易发起、规模更大的问题,提出了一种云环境下基于信任的加密流量DDoS发现方法TruCTCloud.该方法在现有基于机器学习的DDoS攻击检测中引入信任的思想,结合云服务自身的安全认证,融入基于签名和环境因素的信任评估机制过滤合法租户的显然非攻击流量,在无需对加密流量解密的前提下保障合法租户流量中包含的敏感信息.其后,对于其他加密流量和非加密流量,引入流包数中位值、流字节数中位值、对流比、端口增速、源IP增速这5种特征,基于特征构建Ball-tree并提出基于k近邻(k-nearest neighbors,k NN)的流量分类算法.最后,在OpenStack云环境下检测了提出方法的效果,实验表明TruCTCloud方法能快速发现异常流量和识别DDoS攻击的早期流量,同时,能够有效保护合法用户的敏感流量信息. In the cloud environment,DDoS(distributed denial of service)attacks may be more covert,easier to launch and potentially larger because data flow can be encrypted.A trust-based DDoS attack discovery approach for the encrypted traffic in the cloud environment called TruCTCloud is proposed.Firstly,a trust evaluation mechanism is introduced to filter the non-attack traffic of legitimate tenants by exploiting signature of the cloud service itself with the other environmental factors,and then the sensitive information contained in legitimate tenants traffic is guaranteed.Secondly,a traffic classification algorithm based on the k NN(k-nearest neighbors)is proposed to detect and identify for the filtered encrypted traffic and other unencrypted traffic,where five kinds of characteristics including flow median of packets per flow,flow median of bytes per flow,percentage of correlative flow,port growth rate and source IP growth rate are introduced to construct a Ball-tree data structure of characteristics.Finally,some experiments are conducted to evaluate the proposed method in the OpenStack cloud platform.The results suggest that our method can quickly detect the abnormal traffic or early traffic of DDoS attack and effectively protect the sensitive traffic information of legitimate users from the DDoS attack.
作者 潘雨婷 林莉 Pan Yuting;Lin Li(College of Computer Science,Faculty of Information Technology,Beijing University of Technology,Beijing 100124;Beijing Key Laboratory of Trusted Computing(Beijing University of Technology),Beijing 100124)
出处 《计算机研究与发展》 EI CSCD 北大核心 2021年第4期822-833,共12页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61502017) 北京市教委科技计划一般项目(KM201710005024)。
关键词 云环境 DDoS攻击发现 信任过滤 加密流量检测 K近邻算法 cloud environment DDoS attack discovery trust-based filtering encrypted flow detection k NN algorithm
  • 相关文献

参考文献4

二级参考文献24

  • 1刘正伟,文中领,张海涛.云计算和云数据管理技术[J].计算机研究与发展,2012,49(S1):26-31. 被引量:170
  • 2Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing v3.0 [OL]. 2011 [2014-06-20]. https ://cloudseeurityalliance. org/guidance/esaguide, v3.0. pdf.
  • 3Modi C, Dhiren P, Bhavesh B, et al. A survey on security issues and solutions at different layers of cloud computing [J]. The Journal of Supercomputing, 2013, 63(2): 561-592.
  • 4Arbor Networks. The arbor networks 8th annual worldwide infrastructure security report finds DDoS has become part of advanced threat landscape lOLl. 2013 [2014-06-20]. http:// www. arbornetworks, com/news-and-events/press-releasesl recent press-releases/4737-the-arbor-networks-8t h-annuat- worldwide-infrastructure-security-report-finds-ddos-has- become-part of-advanced-threat-landscape.
  • 5Modi C, Patel D, Borisaniya B, et al. A survey of intrusion detection techniques in cloud [J]. Journal of Network and Computer Applications, 2013, 36(1): 42-57.
  • 6Dunlap G W, King S T, Cinar S, et al. ReVirt: Enabling intrusion analysis through virtual-rnachine logging and replay [J]. ACM SIGOPS Operating Systems Review, 2002, 36 (SI) : 211-224.
  • 7Liu Jiuxing, Wei Huang, Bulent A, et al. High performance VMM-bypass I/O in virtual machines [C] //Proc of the Annual Conf. Berkeley, CA: USENIX Association, 2006: 29-42.
  • 8Garfinkel T, Rosenblum M. A virtual machine introspection based architecture for intrusion detection [C] //Proc of the Network and Distributed Systems Security Symp. Reston, VA: Internet Society, 2003:191-206.
  • 9Laureano M, Maziero C, Jamhour E. Intrusion detection in virtual machine environments [C] //Proc of the 30th Euromicro Conf. Los Alamitos, CA: IEEE Computer Society, 2004:520-525.
  • 10Dhage S N, Meshram B B. Intrusion detection system in cloud computing environment [J]. International Journal of Cloud Computing, 2012, 1(2): 261-282.

共引文献58

同被引文献43

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部