期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing 被引量:5
1
作者 Zhen Chen Wenyu Dong +3 位作者 Hang Li Peng Zhang Xinming Chen Junwei Cao 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第1期82-94,共13页
A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile... A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile applications for millions of users by taking advantage of the scale and flexibility of shared physical infrastructures provided by cloud computing. In this scenario, multiple tenants save their data and applications in shared data centers, blurring the network boundaries between each tenant in the cloud. In addition, different tenants have different security requirements, while different security policies are necessary for different tenants. Network virtualization is used to meet a diverse set of tenant-specific requirements with the underlying physical network enabling multi-tenant datacenters to automatically address a large and diverse set of tenants requirements. In this paper, we propose the system implementation of vCNSMS, a collaborative network security prototype system used n a multi-tenant data center. We demonstrate vCNSMS with a centralized collaborative scheme and deep packet nspection with an open source UTM system. A security level based protection policy is proposed for simplifying the security rule management for vCNSMS. Different security levels have different packet inspection schemes and are enforced with different security plugins. A smart packet verdict scheme is also integrated into vCNSMS for ntelligence flow processing to protect from possible network attacks inside a data center network 展开更多
关键词 data center network network security software defined network collaborative network security multi- tenant network virtualization intelligent flow processing cloud computing
原文传递
智慧协同网络安全技术研究
2
作者 李俊涛 《电脑与电信》 2020年第4期48-50,共3页
最近几年棱镜门等安全事件引发世界各国对安全问题的广泛关注,智慧协同网络的架构复杂,安全问题更加突出。目前在智慧协同网络方面的研究大多关注其资源动态匹配、智慧服务匹配等方面,很少有研究智慧协同网络中的安全防御技术。为此对... 最近几年棱镜门等安全事件引发世界各国对安全问题的广泛关注,智慧协同网络的架构复杂,安全问题更加突出。目前在智慧协同网络方面的研究大多关注其资源动态匹配、智慧服务匹配等方面,很少有研究智慧协同网络中的安全防御技术。为此对智慧协同网络中的安全防御技术进行分析研究,从通信过程方面入手,对智慧协同网络中的防DDos攻击的包检测和流检测技术进行分析。 展开更多
关键词 安全技术 协同网络 智慧协同 DDos安全
下载PDF
Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System 被引量:8
3
作者 Zhen Chen Fuye Han +2 位作者 Junwei Cao Xin Jiang Shuo Chen 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第1期40-50,共11页
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bot... Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud- based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively. 展开更多
关键词 cloud computing overlay network collaborative network security system computer forensics anti-botnet ANTI-PHISHING hadoop file system EUCALYPTUS amazon web service
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部