云弹性系统的DDoS隐身检测机制

G. Sophia, Meera Gandhi, Jeppiar Nagar, Gandhi Salai
{"title":"云弹性系统的DDoS隐身检测机制","authors":"G. Sophia, Meera Gandhi, Jeppiar Nagar, Gandhi Salai","doi":"10.1109/ICICES.2017.8070740","DOIUrl":null,"url":null,"abstract":"Cloud computing is one of the recent trending technology. Cloud computing provides the user with multiple resources. The resources include storage, capacity, processing and so on. There are different types of services provided by the cloud, they are Infrastructure as a Service(IaaS), Software as a Service(SaaS) and Platform as a Service(Paas). The user need not invest large amount of money for the infrastructure that is need to develop a small scale industry. Instead the developer can make use of the resources provided but the cloud and can pay only for the services which they are using. The main functionality of Cloud is to provide multiple resources to the users. Storing the data in the Cloud one of the major advantage. The hacker or the Botmaster will try to access or try to gain information of the data which is stored in the Cloud, by sending multiple request to the system. When the number of request exceeds the servers limit, the server will not be able to process the incoming request and the server may crash. The main aim of the paper is to create a framework for Cloud resilience system, which have the ability to provide the service for the clients even when the system is flooded with multiple request. When the incoming request exceeds the limit then the server will not be able to process the request and may crash. Inorder to prevent the server from crashing, a Stealthy DDos Detection Mechanism has been introduced. In this mechanism, the server monitors the number of incoming request given by each individual user. The server is initially given a limited amount of capacity to process the request of a single IP address. When the server load increases it checks all the request given by each user, if the request given by an individual user exceeds the servers limit then all the request from that particular IP address is blocked and all the services which are provided to that IP address is also denied.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Stealthy DDoS detecting mechanism for cloud resilience system\",\"authors\":\"G. Sophia, Meera Gandhi, Jeppiar Nagar, Gandhi Salai\",\"doi\":\"10.1109/ICICES.2017.8070740\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is one of the recent trending technology. Cloud computing provides the user with multiple resources. The resources include storage, capacity, processing and so on. There are different types of services provided by the cloud, they are Infrastructure as a Service(IaaS), Software as a Service(SaaS) and Platform as a Service(Paas). The user need not invest large amount of money for the infrastructure that is need to develop a small scale industry. Instead the developer can make use of the resources provided but the cloud and can pay only for the services which they are using. The main functionality of Cloud is to provide multiple resources to the users. Storing the data in the Cloud one of the major advantage. The hacker or the Botmaster will try to access or try to gain information of the data which is stored in the Cloud, by sending multiple request to the system. When the number of request exceeds the servers limit, the server will not be able to process the incoming request and the server may crash. The main aim of the paper is to create a framework for Cloud resilience system, which have the ability to provide the service for the clients even when the system is flooded with multiple request. When the incoming request exceeds the limit then the server will not be able to process the request and may crash. Inorder to prevent the server from crashing, a Stealthy DDos Detection Mechanism has been introduced. In this mechanism, the server monitors the number of incoming request given by each individual user. The server is initially given a limited amount of capacity to process the request of a single IP address. When the server load increases it checks all the request given by each user, if the request given by an individual user exceeds the servers limit then all the request from that particular IP address is blocked and all the services which are provided to that IP address is also denied.\",\"PeriodicalId\":134931,\"journal\":{\"name\":\"2017 International Conference on Information Communication and Embedded Systems (ICICES)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Information Communication and Embedded Systems (ICICES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICES.2017.8070740\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICES.2017.8070740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

云计算是最近的趋势技术之一。云计算为用户提供多种资源。资源包括存储、容量、处理等。云提供了不同类型的服务,它们是基础设施即服务(IaaS)、软件即服务(SaaS)和平台即服务(Paas)。用户不需要为发展小规模工业所需的基础设施投入大量资金。相反,开发人员可以利用云提供的资源,并且只需为他们正在使用的服务付费。云的主要功能是为用户提供多种资源。将数据存储在云中的主要优势之一。黑客或Botmaster将通过向系统发送多个请求,试图访问或获取存储在云中的数据信息。当请求数量超过服务器限制时,服务器将无法处理传入的请求,并且服务器可能崩溃。本文的主要目的是为云弹性系统创建一个框架,使其能够在系统被多个请求淹没的情况下为客户端提供服务。当传入的请求超过限制时,服务器将无法处理请求并可能崩溃。为了防止服务器崩溃,引入了一种隐蔽的DDos检测机制。在这种机制中,服务器监视每个用户给出的传入请求的数量。服务器最初被赋予有限的容量来处理单个IP地址的请求。当服务器负载增加时,它会检查每个用户给出的所有请求,如果单个用户给出的请求超过了服务器的限制,那么来自该特定IP地址的所有请求都会被阻止,并且提供给该IP地址的所有服务也会被拒绝。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Stealthy DDoS detecting mechanism for cloud resilience system
Cloud computing is one of the recent trending technology. Cloud computing provides the user with multiple resources. The resources include storage, capacity, processing and so on. There are different types of services provided by the cloud, they are Infrastructure as a Service(IaaS), Software as a Service(SaaS) and Platform as a Service(Paas). The user need not invest large amount of money for the infrastructure that is need to develop a small scale industry. Instead the developer can make use of the resources provided but the cloud and can pay only for the services which they are using. The main functionality of Cloud is to provide multiple resources to the users. Storing the data in the Cloud one of the major advantage. The hacker or the Botmaster will try to access or try to gain information of the data which is stored in the Cloud, by sending multiple request to the system. When the number of request exceeds the servers limit, the server will not be able to process the incoming request and the server may crash. The main aim of the paper is to create a framework for Cloud resilience system, which have the ability to provide the service for the clients even when the system is flooded with multiple request. When the incoming request exceeds the limit then the server will not be able to process the request and may crash. Inorder to prevent the server from crashing, a Stealthy DDos Detection Mechanism has been introduced. In this mechanism, the server monitors the number of incoming request given by each individual user. The server is initially given a limited amount of capacity to process the request of a single IP address. When the server load increases it checks all the request given by each user, if the request given by an individual user exceeds the servers limit then all the request from that particular IP address is blocked and all the services which are provided to that IP address is also denied.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信