期刊文献+

云计算环境下的DDoS攻击防御技术研究 被引量:4

Research of DDoS Attack Defense Method in Cloud Computing Environment
下载PDF
导出
摘要 传统的网络防御技术在云计算环境下难以抵御DDoS攻击。针对云计算网络流量的行为特征,提出了一种云计算环境下的基于用户身份认证超载检测和网络流量负载平衡策略的DDoS攻击检测防御模型。该模型对访问云计算数据中心的用户进行身份认证,并通过对异常流量的分层处理来满足云计算服务的数据传输效率与安全性要求。仿真实验结果表明,该模型可有效地检测防御云计算环境下的DDoS攻击行为。 For the conventional network defense technologies, it is hard to defend against the DDoS attacks in cloud computing environment. According to the behavior characteristics of the cloud computing network flow, it proposes a model for the detecting and the defending of the DDoS attacks in cloud computing environment based on the overload detection of user identity authentication and the load balancing strategy of network flow. To meet the requirements of data transmission efficiency and the security of cloud computing services, the proposed model authenticates the identity of users who access the data center and hierarchically processe the abnormal network flow. The simulation results have shown that the proposed model can effectively detect and defend the DDoS attacks to the data center in cloud computing environment.
作者 代昆玉 胡滨
出处 《微型电脑应用》 2016年第11期23-25,29,共4页 Microcomputer Applications
基金 贵州省科学技术基金(黔科合J字[2011]2198号) 贵州大学青年教师科研基金(贵大自青基合字(2012)018号)
关键词 云计算 DDOS攻击防御 流量认证 负载平衡 Cloud computing DDoS attack defense Flow certification Load balancing
  • 相关文献

参考文献2

二级参考文献53

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss 被引量:1
  • 3Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf 被引量:1
  • 4Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403. 被引量:1
  • 5Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11. 被引量:1
  • 6Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28. 被引量:1
  • 7Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117. 被引量:1
  • 8Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003.29-43. 被引量:1
  • 9Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters. In: Proc. of the 6th Symp. on Operating System Design and Implementation. Berkeley: USENIX Association, 2004. 137-150. 被引量:1
  • 10Burrows M. The chubby lock service for loosely-coupled distributed systems. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 335-350. 被引量:1

共引文献2292

同被引文献41

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部