期刊文献+

pTrace:一种面向可控云计算的DDoS攻击源控制技术 被引量:6

pTrace:A Counter Technology of DDoS Attack Source for Controllable Cloud Computing
下载PDF
导出
摘要 当前,越来越多的分布式拒绝服务(distributed denial of service,DDoS)攻击的攻击源迁移至云中,给云计算的可控性及整个网络空间的安全带来了严重挑战.然而关于有效控制云中该类攻击源的研究还比较缺乏.为此设计了一种面向可控云计算的DDoS攻击源控制系统pTrace,该系统包括入口流量过滤inFilter和恶意进程溯源mpTrace两部分.其中,inFilter过滤伪造源地址信息的数据包;mpTrace先识别攻击流及其源地址信息,依据源地址信息追溯并管控发送攻击流的恶意进程.在Openstack和Xen环境下实现了pTrace的原型系统,分析及实验表明,inFilter可以有效地防止含有虚假源地址信息的DDoS攻击包流出云外;当攻击流速率约为正常流量的2.5倍时,mpTrace即可正确识别攻击流信息,并可在ms级的时间内正确追溯攻击流量发送进程.该方法有效控制了位于云中的DDoS攻击源,减小了对云内傀儡租户及云外攻击目标的影响. Currently,agrowing number of attack sources of distributed denial of service(DDoS)are migrating to cloud computing and bringing agreater security challenge to the whole cyberspace.However,the research on effectively suppressing these attack sources is still deficient.So,this paper proposes a method pTrace to defeat the DDoS attack sources in cloud,which comprising the packet filter module inFilter and the malicious process retroactive module mpTrace.inFilter mainly filters packets with forged source address. And, mpTrace firstly identifies attack streams and their corresponding source addresses,then trace malicious processes based on the obtained source addresses.We have implemented a prototype system under Openstack and Xen environment.Experimental results and analysis show that inFilter can prevent large-scale DDoS attack frombeing launched in cloud center with lower time consumption,and mpTrace can identify a attack flow correctly when its flow rate is about 2.5times the normal traffic,tracing malicious processes in ms time level.At last,this method reduces the impact both on puppet cloud tenant and the victim outside cloud.
出处 《计算机研究与发展》 EI CSCD 北大核心 2015年第10期2212-2223,共12页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(2015AA016005) 国家自然科学基金项目(61402464)
关键词 可控云计算 流量过滤 恶意程序溯源 信息熵 虚拟机自省 controllable cloud computing packets filtering malicious program tracebacking information entropy virtual machine introspection
  • 相关文献

参考文献28

  • 1Yasir A, Marwan D. Cloud computing security: Abuse and nefarious use of cloud computing [J]. International Journal of Computational Engineering Research, 2013, 3(6): 22-27.
  • 2Cloud Security Alliance. Top threats to cloud computing lOLl. [2015-08-20]. https://cloudsecurityalliance, org/group/ top-threats.
  • 3Readwire. Bot herders used Google app engine to spread malware [EB/OL]. [ 2015-08-20 ], http://readwrite, com/ # !/2009/11/09/google-confirms-attack-on-goog.
  • 4Linuxidc.亚马逊云服务中发现Zeus僵尸网络[EB/OL].[2015—08—20].http://www.linuxidc.COm/Linux/2009-12/23401_htm.
  • 5Cyeberseecure. Cybercriminals find edge in cloud computing [EB/OL]. [ 2015-08-20 ]. http://cyberseecure. com/2O l l/OT /cybercriminals-find-an edge-in-cloud-computing- newsfactor.
  • 6Computerworld. Thunder in the cloud= MYM6 cloud-based denial-of-service attack [EB/OL]. [ 2015-08-20 ]. http:// www. computerworld, com/article/246873/cloud-computing/ thunder-in-the-cloud---6-cloud-based-denial-of-service-attack. html.
  • 7Badis H, Doyen G, Khatoun, et al. A collaborative approach for a source based detection of botclouds [C] //Proc of 2015 IFIPJIEEE Int Syrup on Integrated Network Management (IM). Piscataway, NJ: IEEE, 2015: 906-909.
  • 8Hammi B, Khatoun R, Doyen G. A factorial space for a system-based detection of botcloud activity [C] //Proc of the 6th Int Conf on Mobility and Security (NTMS). Piscataway, NJ: IEEE, 2014: 1-5.
  • 9Cheenu M. A review of ZeroAccess peer-to-peer botnet [J]. International Journal of Computer Trends & Technology, 2014, 12(2), 60-66.
  • 10Huawei.华为企业云服务[EB/OL].[2015—08—20].http://help.hwclouds.com/help/zedl.html#one.

二级参考文献29

  • 1梁晓,李毅超.基于线程调度的进程隐藏检测技术研究[J].计算机科学,2006,33(10):114-115. 被引量:8
  • 2Greg Hoglund,James Butler.Rootkits:subverting the Windowskernel[M].Addison Wesley Professional,July,2005.
  • 3Sony BMG CD copy protection scandal[EB/OL].http://en.wikinews.org/wiki/Sony%27s_DRM_protected_CDsinstall_Win-dows_Rootkits,2005.
  • 4Rustock[EB/OL].http://www.usenix.org/event/hotbots07/tech/full_papers/chiang/chiang_html/,2007.
  • 5TDSS[EB/OL].http://www.prevx.com/blog/139/Tdss-Rootkit-silently-owns-the-net.html,2009.
  • 6Alkesh Shah.Analysis of rootkits:attack approaches and detectionmechanisms[R].Georgia Institute of Technolog,2008.
  • 7Ric Vieler.Professional rootkits[M].Indiana:Wiley Publishing,2007.
  • 8OECD.Malicious software(malware):a security threat to the In-ternet economy[C].Organization for Economic Cooperation andDevelopment,OECD Ministerial Meeting on the Future of the Inter-net Economy,June,2008.
  • 9Intel Corporation.Intel 64 and IA-32 architectures software developer'smanual volume 3A:system programming guide[Z].Part 1.May 2007.
  • 10Digital signatures for kernel modules on systems running Windowsvista[EB/OL].http://www.microsoft.com/whdc/winlogo/drv-sign/kmsigning.mspx,2007.

共引文献4

同被引文献28

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部