首页> 外国专利> A METHOD OF APPLICATION PROFILING FOR DETECTING DOS/DDOS ATTACK LAUNCHING APPLICATIONS IN CLOUD COMPUTING

A METHOD OF APPLICATION PROFILING FOR DETECTING DOS/DDOS ATTACK LAUNCHING APPLICATIONS IN CLOUD COMPUTING

机译:一种在云计算中检测DOS / DDOS攻击启动应用程序的应用程序配置方法

摘要

This invention pertains to the effective and efficient detection of DoS/DDoS attacks propagated by malicious users by utilizing hired compute resources from Cloud Service Providers (CSPs). This invention is designed for CSPs which need to ensure that their infrastructure is not used to propagate large-scale malicious attacks using the huge computing power on offer. The solution involves creating static (installation time) and dynamic (run-time) profiles of every application installed by the end-user on the virtual machine provisioned by the CSP. The static profile includes the number of files, their size and their checksum values, while the dynamic profile is essentially time-series data for CPU, Memory, Disk and I/O usage/utilization. The invention relies on matching the static and dynamic profiles with profiles available for known malicious applications in a database accessible by all CSPs. This is done through matching the run-time behavioral patterns and resource usage trends of the application with known malicious applications and involves comparison of time-series data. Detailed analysis of known malicious applications on well-known CSPs with varying number of threads forms the basis of classification and detection of malicious applications. The malicious application detection logic also factors in variations observed by executing the same application on different CSPs to improve effectiveness. Malicious applications are classified based on observed deviations in resource usage patterns/trends referring such applications to human cloud administrators for final classification. The decision making process is captured in an expert system to speed-up detection times for future cases.
机译:通过利用从云服务提供商(CSP)租用的计算资源,本发明涉及对由恶意用户传播的DoS / DDoS攻击的有效检测。本发明是为需要使用提供的巨大计算能力来确保其基础结构不被用来传播大规模恶意攻击的CSP而设计的。该解决方案涉及为最终用户在CSP设置的虚拟机上安装的每个应用程序创建静态(安装时间)和动态(运行时)配置文件。静态配置文件包括文件数量,文件大小和校验和值,而动态配置文件本质上是CPU,内存,磁盘和I / O使用/利用率的时间序列数据。本发明依赖于将静态和动态配置文件与可用于所有CSP访问的数据库中的已知恶意应用程序的配置文件匹配。这是通过将应用程序的运行时行为模式和资源使用趋势与已知的恶意应用程序进行匹配来完成的,并且涉及时间序列数据的比较。对具有不同线程数的知名CSP上已知恶意应用程序的详细分析构成了恶意应用程序分类和检测的基础。恶意应用程序检测逻辑还考虑了通过在不同的CSP上执行同一应用程序而观察到的差异,以提高有效性。根据观察到的资源使用模式/趋势偏差对恶意应用程序进行分类,然后将此类应用程序推荐给人类云管理员进行最终分类。决策过程被捕获在专家系统中,以加快将来案件的检测速度。

著录项

  • 公开/公告号IN2015DE00286A

    专利类型

  • 公开/公告日2016-08-05

    原文格式PDF

  • 申请/专利权人

    申请/专利号IN286/DEL/2015

  • 发明设计人 LOHIT KAPOOR;ANKUR GUPTA;SHAFQAT SHAMIM;

    申请日2015-02-02

  • 分类号H04L63/1408;

  • 国家 IN

  • 入库时间 2022-08-21 14:25:09

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号