A2M: Access-Assured Mobile Desktop Computing

被引:0
|
作者
Stavrou, Angelos [1 ]
Barrato, Ricardo A. [2 ]
Keromytis, Angelos D. [2 ]
Nieh, Jason [2 ]
机构
[1] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
[2] Columbia Univ, Comp Sci Dept, New York, NY 10027 USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Continued improvements in network bandwidth, cost, and ubiquitous access are enabling service providers to host desktop computing environments to address the complexity, cost, and mobility limitations of today's personal computing infrastructure. However, distributed denial of service attacks can deny use of such services to users. We present A(2)M, a secure and attack-resilient desktop computing hosting infrastructure. A(2)M combines a stateless and secure communication protocol, a single-hop Indirection-based network (IBN) and a remote display architecture to provide mobile users with continuous access to their desktop computing sessions. Our architecture protects both the hosting infrastructure and the client's connections against a wide range of service disruption attacks. Unlike any other DoS protection system, A(2)M takes advantage of its low-latency remote display mechanisms and asymmetric traffic characteristics by using multi-path routing to send a small number of replicas of each packet transmitted from client to server. This packet replication through different paths, diversifies the client-server communication, boosting system resiliency and reducing end-to-end latency. Our analysis and experimental results on PlanetLab demonstrate that A(2)M significantly increases the hosting infrastructure's attack resilience even for wireless scenarios. Using conservative ISP bandwidth data, we show that we can protect against attacks involving thousands (150, 000) attackers, while providing good performance for multimedia and web applications and basic GUI interactions even when up to 30% and 50%, respectively, of indirection nodes become unresponsive.
引用
收藏
页码:186 / +
页数:3
相关论文
共 50 条
  • [41] Increased risk for Alzheimer disease with the interaction of MPO and A2M polymorphisms
    Zappia, M
    Manna, I
    Serra, P
    Cittadella, R
    Andreoli, V
    La Russa, A
    Annesi, F
    Spadafora, P
    Romeo, N
    Nicoletti, G
    Messina, D
    Gambardella, A
    Quattrone, A
    [J]. ARCHIVES OF NEUROLOGY, 2004, 61 (03) : 341 - 344
  • [42] Performance evaluation of remote display access for mobile cloud computing
    Lin, Youming
    Kamarainen, Teemu
    Di Francesco, Mario
    Yla-Jaaski, Antti
    [J]. COMPUTER COMMUNICATIONS, 2015, 72 : 17 - 25
  • [43] Seamless networked mobile computing realized by wireless Internet access
    Ohsawa, T
    Okanoue, K
    Madihian, M
    Ishii, K
    Kakura, Y
    [J]. NEC RESEARCH & DEVELOPMENT, 1997, 38 (01): : 81 - 88
  • [44] Converging Mobile Edge Computing and Wireless Access for Virtual Reality
    Wang, Qingtian
    Shou, Guochu
    Liu, Yaqiong
    Lin, Feng
    Seah, Hock Soon
    [J]. INTERNATIONAL WORKSHOP ON ADVANCED IMAGE TECHNOLOGY (IWAIT) 2019, 2019, 11049
  • [45] Opportunistic Access Point Selection for Mobile Edge Computing Networks
    Xia, Junjuan
    Fan, Lisheng
    Yang, Nan
    Deng, Yansha
    Duong, Trung Q.
    Karagiannidis, George K.
    Nallanathan, Arumugam
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (01) : 695 - 709
  • [46] Towards Mobile Cloud Computing with Single Sign-on Access
    F. Lordan
    J. Jensen
    R. M. Badia
    [J]. Journal of Grid Computing, 2018, 16 : 627 - 646
  • [47] Selective grid access for energy-aware mobile computing
    Park, Eunjeong
    Shin, Heonshik
    Kim, Seung Jo
    [J]. UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2007, 4611 : 798 - +
  • [48] Towards Mobile Cloud Computing with Single Sign-on Access
    Lordan, F.
    Jensen, J.
    Badia, R. M.
    [J]. JOURNAL OF GRID COMPUTING, 2018, 16 (04) : 627 - 646
  • [49] Secure access policy for efficient resource in mobile computing environment
    Jo S.-M.
    [J]. Journal of Computer Virology and Hacking Techniques, 2017, 13 (4) : 297 - 303
  • [50] Seamless networked mobile computing realized by wireless internet access
    Ohsawa, T
    Okanoue, K
    Madihian, M
    Ishii, K
    Kakura, Y
    [J]. 1996 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - CONVERGING TECHNOLOGIES FOR TOMORROW'S APPLICATIONS, VOLS. 1-3, 1996, : 792 - 796