A cloud tracing and filtering framework for defensing against denial of service attacks

被引:0
|
作者
Lin F. [1 ]
Zeng W. [2 ]
Jiang Y. [3 ]
机构
[1] School of Software, Xiamen University
[2] Fujian Key Laboratory of the Brain-Like Intelligent Systems, Xiamen University
[3] Department of Computer Science, Xiamen University
关键词
Cloud computing; Denial of service attacks; Network security; SaaS;
D O I
10.4156/jdcta.vol4.issue9.26
中图分类号
学科分类号
摘要
Cloud computing is Internet-based computing, whereby shared resources, software, and nformation are provided to computers and other devices on demand, like the electricity grid. One of the most serious threats to cloud computing itself comes from Denial of Service attacks, especially HTTP or XML-Based Denial of Service attacks. These types of attacks are simple and easy to implement by the attacker, but to security experts they are twice as difficult to stop. In this paper, we introduced a security service called Cloud Tracing & Filtering (CTF), which is like a service broker within a SOA model, and a back propagation neutral network called Cloud Shield, which was trained to detect and filter DoS attack traffic. And we also presented a solution to detect and trace through CTF to find the source of those attacks. The experimental results show that CTF is able to detect and filter most of the attack messages and to identify the source of the attack within a short period of time.
引用
收藏
页码:212 / 224
页数:12
相关论文
共 50 条
  • [1] A source address filtering firewall to defend against denial of service attacks
    Xu, Y
    Lee, HCJ
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3296 - 3300
  • [2] Detecting Denial of Service Attacks in the Cloud
    Kumar, Raneel
    Lal, Sunil Pranit
    Sharma, Alok
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 309 - 316
  • [3] Denial of Service Attacks Mitigation in the Cloud
    Alosaimi, Wael
    Zak, Michal
    Al-Begain, Khalid
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 47 - 53
  • [4] A framework for countering denial of service attacks
    Mukkamala, S
    Sung, AH
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 3273 - 3278
  • [5] A framework for classifying denial of service attacks
    Hussain, A
    Heidemann, J
    Papadopoulos, C
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2003, 33 (04) : 99 - 110
  • [6] A framework for the analysis of denial of service attacks
    Sharafat, AR
    Fallah, MS
    COMPUTER JOURNAL, 2004, 47 (02): : 179 - 192
  • [7] Protecting against distributed denial of service (DDoS) attacks using distributed filtering
    Trostle, Jonathan
    2006 SECURECOMM AND WORKSHOPS, 2006, : 201 - 211
  • [8] A Framework for the Analysis of Denial of Service Attacks
    Sharafat, A.R. (sharafat@isc.iranet.net), 1600, Oxford University Press (47):
  • [9] Trident: Defensing Synergetic Denial-of-Service Attacks in Underwater Named Data Networking
    Li, Yue
    Liu, Yingjian
    Yin, Haoyu
    Guo, Zhongwen
    Wang, Yu
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (23) : 20633 - 20648
  • [10] Distributed Denial of Service Attacks in Cloud Computing
    Abusaimeh, Hesham
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (06) : 163 - 168