首页> 外文OA文献 >Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
【2h】

Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks

机译:保护云计算服务免受突发DDoS攻击的安全方案

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

In cloud computing, data and applications are maintained on remote servers and accessed via the Internet. Virtualised resources such as dynamic servers are operated through the Internet, which increases the economic benefits accrued to customers from software. Cloud computing reduces customer concerns about software licenses, hardware, and overall system maintenance. Connections between web services are typically enabled using the simple object access protocol (SOAP), and extensible markup language (XML) or hypertext transport protocol (HTTP) is used to construct SOAP messages. Denial of service (DoS) and distributed DoS (DDoS) are two major problems affecting cloud computing services, and it is a challenge to resolve them completely. The identity of the perpetrators of these acts is usually difficult to ascertain especially when the attacks are carried out using spoofed IP addresses. Consequently, differentiating genuine packets from the packets sent by hackers is difficult. The addresses are spoofed with the intention of causing harm to cloud service provider communication channels. Distinguishing legitimate messages from illegitimate messages is an important step towards solving the problem of DDoS attacks. Modulo and CLASSIE methods effectively detect and reduce spoofing attacks using unique rulesets. In this paper, we propose using modulo packet marking and a method called reconstruct and drop (RAD) to differentiate and discard malicious packets. The proposed method improves the detection and filtering of DDoS attacks. Further, the results of comparisons conducted indicate that the proposed method requires fewer bits than Huffman code and its performance is better than that of cloud protector.
机译:在云计算中,数据和应用程序维护在远程服务器上,并可以通过Internet访问。虚拟资源(例如动态服务器)通过Internet进行操作,从而增加了从软件为客户带来的经济收益。云计算减少了客户对软件许可,硬件和整体系统维护的担忧。通常使用简单对象访问协议(SOAP)启用Web服务之间的连接,并使用可扩展标记语言(XML)或超文本传输​​协议(HTTP)构造SOAP消息。拒绝服务(DoS)和分布式DoS(DDoS)是影响云计算服务的两个主要问题,要完全解决它们是一个挑战。这些行为的实施者的身份通常很难确定,尤其是在使用欺骗性IP地址进行攻击时。因此,很难将真正的数据包与黑客发送的数据包区分开。欺骗地址是为了破坏云服务提供商的通信渠道。区分合法消息和非法消息是解决DDoS攻击问题的重要一步。使用独特的规则集,Modulo和CLASSIE方法可有效检测并减少欺骗攻击。在本文中,我们提出使用模数据包标记和一种称为“重构和丢弃”(RAD)的方法来区分和丢弃恶意数据包。所提出的方法改进了DDoS攻击的检测和过滤。此外,进行的比较结果表明,该方法所需的比特数少于霍夫曼编码,并且其性能优于云保护器。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号