VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms
Academic paper|更新时间:2024-06-05
|
VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms
Journal on CommunicationsVol. 36, Issue 1, Pages: 30-37(2015)
作者机构:
中国民航大学 天津市智能信号处理重点实验室,天津 300300
作者简介:
基金信息:
The National Natural Science Foundation of China(61170328);The National Natural Science Foundation of China(U1333116);The Natural Science Foundation of Tian-jin(12JCZDJC20900);Civil Aviation Science and Technology Innovation Fund(MHRD20130217);Research Laboratory Construction Funds of Civil Aviation University of China;Fundamental Research Funds for the Central Universities(3122013P007);Fundamental Research Funds for the Central Universities(3122013D007);Fundamental Research Funds for the Central Universities(3122013D003)
UZhi-jun W, UIYi C, UEMeng Y. VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms[J]. Journal on Communications, 2015, 36(1): 30-37.
DOI:
UZhi-jun W, UIYi C, UEMeng Y. VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms[J]. Journal on Communications, 2015, 36(1): 30-37. DOI: 10.11959/j.issn.1000-436x.2015004.
VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms
Based on the analysis of security overlay service (SOS) approach of defending against DDoS attacks in large scale network
the vulnerability in the exit mechanism of being attacked nodes in SOS approach is explored.The vulnerability is solved by improving the Chord algorithm according to the routing strategy in cloud computing.Hence
the virtualization hash security access path (VHSAP) in three-layer structure is proposed to protect the cloud computing platform.In VHSAP
the heartbeat mechanism is applied to realize virtual nodes by using the virtual technology.Therefore
the virtual nodes have the ability of resilience
which can complete the seamless switching between being attacked nodes in cloud computing platform
and guarantee the legitimate user's authority of accessing to the resource in cloud computing platform.Experiments of VHSAP defending against DDoS attacks are carried out in simulation network environment.The parameters
such as the number of being attacked nodes in hash secure access path (HSAP)
and the switching time and the handoff delay between nodes
are focused in experiments.The result shows that VHSAP achieves a higher data pass rate than that of SOS approach
and enhances the security of cloud computing platform.
SUN C H , LIU B . Survey on new solutions against distributed denial of service attacks [J ] . ACTA Electronica Sinica , 2009 , 37 ( 7 ): 1563 - 1568 .
FENG D G , ZHANG M , ZHANG Y , et al . Study on cloud computing security [J ] . Journal of Software , 2012 , 22 ( 1 ): 72 - 81 .
KEROMYTIS A D , MISRA V , RUBENSTEIN D . SOS:an architecture for mitigating DDoS attacks [J ] . IEEE Journal on Selected Areas in Communications , 2004 , 22 ( 1 ): 176 - 187 .
STAVROU A , KEROMYTIS A D . Countering DoS attacks with stateless multipath overlays [A ] . Proceedings of the 12th ACM Conference on Computer and Communications Security CCS '05 , Alexandria,Virginia,USA , 2005 . 249 - 259 .
XUAN D , CHELLAPPAN S , WANG X , et al . Analyzing the secure overlay services architecture under intelligent DDoS attacks [A ] . Proceedings of the 24th International Conference on Distributed Computing Systems , Tokyo Japan , 2004 . 408 - 417 .
WANG X , CHELLAPPAN S , BOYER P , et al . On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks [J ] . IEEE Transactions on Parallel and Distributed Systems , Tokyo Japan , 2006 , 17 ( 7 ): 619 - 632 .
IN C H , HONG C S , WEI J , et al . An enhanced SOS architecture for DDoS attack defense using active network technology [A ] . Proceedings of Advanced Industrial Conference on Telecommunications/ Service Assurance with Partial and Intermittent Resources Conference/ELearning on Telecommunications Workshop [C ] . Lisbon,Portugal , 2005 . 90 - 95 .
KAUR R , SANGA A L , KUMAR K . Secure overlay services (SOS):a critical analysis [A ] . 2012 2nd IEEE International Conference on Parallel,Distributed and Grid Computing [C ] . Ottawa,Canada , 2012 . 457 - 462 .
LU G Q . Tum routing platform in cloud computing [J ] . Information Security and Technology , 2010 ,( 8 ): 106 - 108 .
DING S L , ZHAO X H . Analysis and improvement on Chord protocol for structured P2P [A ] . IEEE 3rd International Conference on Communication Software and Networks , 2011 . 214 - 218 .
THIRUVATHUKAL G K , HINSEN K , LÄUFER K , et al . Virtualization for computational scientists [J ] . Computing in Science & Engineering , 2010 , 12 ( 4 ): 52 - 60 .