Ricardo Macedo, A. Santos, Y. Ghamri-Doudane, M. N. Lima
{"title":"保护安装:重组以减轻身份提供者集群上的DDoS攻击","authors":"Ricardo Macedo, A. Santos, Y. Ghamri-Doudane, M. N. Lima","doi":"10.1145/2801694.2801709","DOIUrl":null,"url":null,"abstract":"Under the increasing popularization of portable and mobile devices, as well as the positive trends to the Internet of Everything, Identity Management systems gain a crucial role in integrating different administrative domains towards a global ubiquitous computing. Denial-of-Service (DoS) attacks can make IdM operations unavailable, preventing the use of computational resources by legitimate users. This work presents SAMOS, a novel Scheme for DoS Attacks Mitigation by the reOrganization and optimization of the IdM System. SAMOS optimizes the reorganization of the IdM system components founded on optimization techniques, minimizing DoS effects and improving the system lifetime. Results considering data from a real IdM system indicate the scheme viability and benefits.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"39 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Guard Mounting: Reorganizations to Mitigate DDoS Attacks over Identity Providers Clustering\",\"authors\":\"Ricardo Macedo, A. Santos, Y. Ghamri-Doudane, M. N. Lima\",\"doi\":\"10.1145/2801694.2801709\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Under the increasing popularization of portable and mobile devices, as well as the positive trends to the Internet of Everything, Identity Management systems gain a crucial role in integrating different administrative domains towards a global ubiquitous computing. Denial-of-Service (DoS) attacks can make IdM operations unavailable, preventing the use of computational resources by legitimate users. This work presents SAMOS, a novel Scheme for DoS Attacks Mitigation by the reOrganization and optimization of the IdM System. SAMOS optimizes the reorganization of the IdM system components founded on optimization techniques, minimizing DoS effects and improving the system lifetime. Results considering data from a real IdM system indicate the scheme viability and benefits.\",\"PeriodicalId\":62224,\"journal\":{\"name\":\"世界中学生文摘\",\"volume\":\"39 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"世界中学生文摘\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://doi.org/10.1145/2801694.2801709\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"世界中学生文摘","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1145/2801694.2801709","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Guard Mounting: Reorganizations to Mitigate DDoS Attacks over Identity Providers Clustering
Under the increasing popularization of portable and mobile devices, as well as the positive trends to the Internet of Everything, Identity Management systems gain a crucial role in integrating different administrative domains towards a global ubiquitous computing. Denial-of-Service (DoS) attacks can make IdM operations unavailable, preventing the use of computational resources by legitimate users. This work presents SAMOS, a novel Scheme for DoS Attacks Mitigation by the reOrganization and optimization of the IdM System. SAMOS optimizes the reorganization of the IdM system components founded on optimization techniques, minimizing DoS effects and improving the system lifetime. Results considering data from a real IdM system indicate the scheme viability and benefits.