首页> 外文学位 >FAPA: Flooding Attack Protection Architecture in a cloud system.
【24h】

FAPA: Flooding Attack Protection Architecture in a cloud system.

机译:FAPA:云系统中的洪水攻击防护体系结构。

获取原文
获取原文并翻译 | 示例

摘要

The rate of acceptance of clouds each year is making cloud computing the leading IT computational technology. While cloud computing can be productive and economical, it is still vulnerable to different types of external threats, one of which is a Denial of Service (DoS) attack. DoS attacks have long been an open security problem of the internet. Most proposed solutions to address DoS attacks require upgrades in routers, modification in the BGP (Border Gateway Protocol), usage of additional control bits in the IP packets, or adjustments to legacy routers in the routing path. It is extremely difficult to manipulate all these criteria, considering that the internet, and potentially a cloud, consists of a very large number of autonomous systems with routers from different vendors deployed over decades. Authentication protocols are typically implemented by some of the leading companies manufacturing DoS prevention routers. However, authentication protocols and embedded digital signatures are very expensive and vulnerable. This is contrary to the benefits of renting a cloud system, which is to save capital expenditure as well as operational expenditure.;Rather than depending on cloud providers, we proposed a model, called FAPA (Flooding Attack Protection Architecture), to detect and filter packets when DoS attacks occur. FAPA can be deployed at different levels of the system, such as at the user's end. FAPA can run locally on top of the client's terminal and is independent of the provider's cloud machine. There is no need to deploy any expensive packet capturing tools nor does it require any embedded digital signature inside the packets. There is no additional charge from the provider's end since the application runs in the customer's end. Moreover, automatic message propagation invokes the cloud server to trace the source or adversary.;In FAPA, detection of denial of service is handled by the periodic analysis of the traffic behavior from the raw packets. It generates an alarm if any DoS attack is detected and removes flooding by filtering. Because FAPA is employed on the client's side, customers have control over traffic trends, which is absent in other DoS prevention approaches. FAPA is comprised of five individual modules, where each module has an assigned task in detecting DoS attacks and removing threats by filtering the spoof packets. A module fetches the traffic packets and does the unwrapping. Another module records the pertinent parameters of network packets.;Implementation of a FAPA prototype and experimental results has demonstrated the feasibility of FAPA. From our initial experiments we observed that in the event of a DoS attack, some of the network parameters change. Hence, in FAPA a separate module is dedicated for storing information about traffic behavior. If FAPA observes any inconsistent traffic behavior, it invokes the filtering modules to remove the compromised network packets. FAPA filtering detects the threat by using previously recorded information. FAPA filtering was implemented for a cluster environment and we ran experiments to determine its effectiveness. The filtering module was then modified to run in a cloud environment and was able to handle a large set of network packets. We investigated the impact of DDoS attacks on co-resident virtual machines and their neighbors. Later we conducted DDoS attacks from a commercially launched public cloud onto private cloud instances to observe the amplification of an attack and checked the efficiency of FAPA in terms of filtering those non legitimate packets. We also measured FAPA performance in terms of false positive and false negative rates. We deployed several commercially used stress testing tools to observe FAPA's performance. Both in the cloud and on the cluster, our experimental results demonstrated that FAPA was able to detect and filter packets to successfully remove a DoS attack.
机译:每年,云的接受率使云计算成为领先的IT计算技术。尽管云计算可以高效且经济地进行,但它仍然容易受到不同类型的外部威胁的攻击,其中之一就是拒绝服务(DoS)攻击。长期以来,DoS攻击一直是Internet的公开安全问题。针对DoS攻击提出的大多数解决方案都要求对路由器进行升级,对BGP(边界网关协议)进行修改,在IP数据包中使用其他控制位或对路由路径中的传统路由器进行调整。考虑到Internet以及可能由云组成的大量自治系统以及几十年来部署的来自不同供应商的路由器,要操纵所有这些标准极其困难。身份验证协议通常由制造DoS防护路由器的一些领先公司实施。但是,身份验证协议和嵌入式数字签名非常昂贵且易受攻击。这与租用云系统的好处相反,后者可以节省资本支出和运营支出。我们不是依赖于云提供商,而是提出了一种称为FAPA(洪水攻击防护体系结构)的模型来检测和过滤发生DoS攻击时发送数据包。 FAPA可以部署在系统的不同级别,例如用户端。 FAPA可以在客户端终端的本地运行,并且独立于提供商的云计算机。无需部署任何昂贵的数据包捕获工具,也无需在数据包内部使用任何嵌入式数字签名。由于应用程序在客户端运行,因此从提供商端不收取任何额外费用。此外,自动消息传播会调用云服务器来跟踪源或对手。在FAPA中,拒绝服务的检测是通过对原始数据包的流量行为进行定期分析来进行的。如果检测到任何DoS攻击,它将生成警报,并通过过滤消除泛洪。由于FAPA是在客户端使用的,因此客户可以控制流量趋势,这是其他DoS预防方法所没有的。 FAPA由五个单独的模块组成,其中每个模块都具有分配的任务,以检测DoS攻击并通过过滤欺骗数据包消除威胁。模块获取流量数据包并进行解包。另一个模块记录了网络数据包的相关参数。FAPA原型的实现和实验结果证明了FAPA的可行性。从最初的实验中,我们观察到在发生DoS攻击时,某些网络参数会发生变化。因此,在FAPA中,一个单独的模块专用于存储有关交通行为的信息。如果FAPA观察到任何不一致的流量行为,它将调用过滤模块以删除受损的网络数据包。 FAPA过滤通过使用以前记录的信息来检测威胁。 FAPA过滤是针对集群环境实施的,我们进行了实验以确定其有效性。然后,将过滤模块修改为在云环境中运行,并且能够处理大量网络数据包。我们调查了DDoS攻击对共存虚拟机及其邻居的影响。后来,我们从商业发布的公共云到私有云实例进行了DDoS攻击,以观察攻击的放大情况,并在过滤那些非合法数据包方面检查了FAPA的效率。我们还根据误报率和误报率来衡量FAPA的绩效。我们部署了几种商用压力测试工具来观察FAPA的性能。无论是在云端还是在集群上,我们的实验结果都表明,FAPA能够检测和过滤数据包以成功消除DoS攻击。

著录项

  • 作者

    Zunnurhain, Kazi.;

  • 作者单位

    The University of Alabama.;

  • 授予单位 The University of Alabama.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2014
  • 页码 167 p.
  • 总页数 167
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号