A cloud tracing and filtering framework for defensing against denial of service attacks

被引:0
|
作者
Lin F. [1 ]
Zeng W. [2 ]
Jiang Y. [3 ]
机构
[1] School of Software, Xiamen University
[2] Fujian Key Laboratory of the Brain-Like Intelligent Systems, Xiamen University
[3] Department of Computer Science, Xiamen University
关键词
Cloud computing; Denial of service attacks; Network security; SaaS;
D O I
10.4156/jdcta.vol4.issue9.26
中图分类号
学科分类号
摘要
Cloud computing is Internet-based computing, whereby shared resources, software, and nformation are provided to computers and other devices on demand, like the electricity grid. One of the most serious threats to cloud computing itself comes from Denial of Service attacks, especially HTTP or XML-Based Denial of Service attacks. These types of attacks are simple and easy to implement by the attacker, but to security experts they are twice as difficult to stop. In this paper, we introduced a security service called Cloud Tracing & Filtering (CTF), which is like a service broker within a SOA model, and a back propagation neutral network called Cloud Shield, which was trained to detect and filter DoS attack traffic. And we also presented a solution to detect and trace through CTF to find the source of those attacks. The experimental results show that CTF is able to detect and filter most of the attack messages and to identify the source of the attack within a short period of time.
引用
收藏
页码:212 / 224
页数:12
相关论文
共 50 条
  • [31] An inline detection and prevention framework for distributed denial of service attacks
    Chen, Zhongqiang
    Chen, Zhongrong
    Delis, Alex
    COMPUTER JOURNAL, 2007, 50 (01): : 7 - 40
  • [32] An inline detection and prevention framework for distributed denial of service attacks
    Chen, Zhongqiang
    Chen, Zhongrong
    Delis, Alex
    Computer Journal, 2007, 50 (01): : 7 - 40
  • [33] A Framework Based on Time and Space for Analyzing Denial of Service Attacks
    Chang, Jing
    Xue, Rui
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 412 - 417
  • [34] Protecting Dynamic Mobile Agent against Denial of Service Attacks
    Aggarwal, Mayank
    Nipur
    Pallavi
    INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10), 2010, 1324 : 316 - +
  • [35] Security Solution against Denial of Service Attacks in BESIP System
    Rezac, Filip
    Voznak, Miroslav
    Safarik, Jakub
    Partila, Pavol
    Tomala, Karel
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2013, 2013, 8755
  • [36] Review on Mitigation of Distributed Denial of Service (DDoS) Attacks in Cloud Computing
    Khadke, Ashwini
    Madankar, Mangala
    Motghare, Manish
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [37] An IP traceback technique against denial-of-service attacks
    Chen, ZL
    Lee, MC
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 96 - 104
  • [38] Cryptographic salt: A countermeasure against denial-of-service attacks
    Park, D
    Kim, J
    Boyd, C
    Dawson, E
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 334 - 343
  • [39] Survey on new solutions against distributed denial of service attacks
    Sun, Chang-Hua
    Liu, Bin
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2009, 37 (07): : 1562 - 1570
  • [40] Simplified Clock Drift Management to Avoid Denial of Service Attacks in Cloud
    Varalakshmi, P.
    Murrali, Mukund
    Prakash, Shiva G.
    Kumar, Sarath B.
    2013 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2013, : 331 - 336