通信学报 ›› 2016, Vol. 37 ›› Issue (Z1): 204-210.doi: 10.11959/j.issn.1000-436x.2016268

• 学术通信 • 上一篇    下一篇

基于熵变的多租户云内DDoS检测方法研究

王淼1,2,王利明1,徐震1,马多贺1   

  1. 1 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
    2 中国科学院大学网络空间安全学院,北京 100049
  • 出版日期:2016-10-25 发布日期:2017-01-17
  • 基金资助:
    国家高技术研究发展计划(“863”计划)基金资助项目;中国科学院先导专项基金资助项目;中国科学院先导专项基金资助项目

Research on DDoS detection in multi-tenant cloud based on entropy change

Miao WANG1,2,Li-ming WANG1,Zhen XU1,Duo-he MA1   

  1. 1 State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    2 College of Cyberspace Security,University of Chinese Academy of Sciences,Beijing 100049,China
  • Online:2016-10-25 Published:2017-01-17
  • Supported by:
    The National High Technology Research and Development Program of China (863 Program);Strategic Priority Research Program of the Chinese Academy of Sciences;Strategic Priority Research Program of the Chinese Academy of Sciences

摘要:

分布式拒绝服务(DDoS)是攻击者通过入侵云内虚拟机组成攻击网络,以威胁多租户云系统安全的攻击。多租户云系统DDoS攻击检测难点在于如何确定攻击源虚拟机和攻击目标,尤其当攻击目标为云内主机时。提出一种基于熵度量的DDoS攻击检测方法,根据云环境特点在优先定位攻击源基础上再确定攻击目标,检测多租户云系统内发起的DDoS攻击。提出分布式检测架构,利用检测代理发现潜在攻击源端的可疑攻击流量,检测服务器识别DDoS攻击的真正攻击流。理论和实验分析验证了提出方法的可行性和有效性。

关键词: 分布式拒绝服务攻击, 攻击检测, 多租户, 云计算系统,

Abstract:

An attacker compromised a number of VMs in the cloud to form his own network to launch a powerful distrib-uted denial of service (DDoS) attack.DDoS attack is a serious threat to multi-tenant cloud.It is difficult to detect which VM in the cloud are compromised and what is the attack target,especially when the VM in the cloud is the victim.A DDoS detection method was presented suitable for multi-tenant cloud environment by identifying the malicious VM at-tack sources first and then the victims.A distributed detection framework was proposed.The distributed agent detects the suspicious VM which generate the potential DDoS attack traffic flows on the source side.A central server confirms the real attack flows.The feasibility and effectiveness of the proposed detection method are verified by experiments in the multi-tenant cloud environment.

Key words: DDoS attack, detection, multi-tenant, cloud computing system, entropy

No Suggested Reading articles found!