Design Issues of Enhanced DDoS Protecting Scheme under the Cloud Computing Environment
碩士 === 東吳大學 === 資訊管理學系 === 104 === Due to the growth of the Internet and the increase of data, many companies have begun to migrate their data services from the Web to the Cloud, but it comes with many security issues, such as Distributed Denial of Service attack (DDoS) and Zero-day attack. However,...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/74132183381232999660 |
id |
ndltd-TW-104SCU00396024 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-104SCU003960242017-09-24T04:40:40Z http://ndltd.ncl.edu.tw/handle/74132183381232999660 Design Issues of Enhanced DDoS Protecting Scheme under the Cloud Computing Environment 雲端環境下改良式DDoS防禦機制之研究 LI, YU-ZHAN 李毓展 碩士 東吳大學 資訊管理學系 104 Due to the growth of the Internet and the increase of data, many companies have begun to migrate their data services from the Web to the Cloud, but it comes with many security issues, such as Distributed Denial of Service attack (DDoS) and Zero-day attack. However, the DDoS is a critical threat on the cloud computing environment, it attempts to make a machine or network unavailable to their cloud users. Confidence Based Filtering (CBF) is one of the conventional approaches to defending against DDoS under cloud computing environment. Practically, the CBF method is to collect the packets and extract attribute pairs for calculating the score of each packet, then it decides to discard it or not. However, the weight of each attribute pair and the threshold value in the calculation is static in the CBF method. Therefore, we propose a novel method called N-CBF that improves these drawbacks of the CBF method. First, the N-CBF scheme can dynamically adjust the weight values of each attribute pair. Second, each packet will have the unique threshold value. Third, we performed simulations to compare and analyze the effectiveness and efficiency of N-CBF scheme according to the KPIs. Finally, the simulation results indicate that the proposed N-CBF scheme can obtain higher detection and better accuracy ratios about average of 8.04% and 2.48% than CBF, respectively. But, we need to pay a little overhead in average processing time. Consequently, the N-CBF can support more refined and robust protection mechanisms against DDoS attacks and also provide a more secure cloud computing environment. YANG, SHIN-JER 楊欣哲 2016 學位論文 ; thesis 48 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 東吳大學 === 資訊管理學系 === 104 === Due to the growth of the Internet and the increase of data, many companies have begun to migrate their data services from the Web to the Cloud, but it comes with many security issues, such as Distributed Denial of Service attack (DDoS) and Zero-day attack. However, the DDoS is a critical threat on the cloud computing environment, it attempts to make a machine or network unavailable to their cloud users. Confidence Based Filtering (CBF) is one of the conventional approaches to defending against DDoS under cloud computing environment. Practically, the CBF method is to collect the packets and extract attribute pairs for calculating the score of each packet, then it decides to discard it or not. However, the weight of each attribute pair and the threshold value in the calculation is static in the CBF method. Therefore, we propose a novel method called N-CBF that improves these drawbacks of the CBF method. First, the N-CBF scheme can dynamically adjust the weight values of each attribute pair. Second, each packet will have the unique threshold value. Third, we performed simulations to compare and analyze the effectiveness and efficiency of N-CBF scheme according to the KPIs. Finally, the simulation results indicate that the proposed N-CBF scheme can obtain higher detection and better accuracy ratios about average of 8.04% and 2.48% than CBF, respectively. But, we need to pay a little overhead in average processing time. Consequently, the N-CBF can support more refined and robust protection mechanisms against DDoS attacks and also provide a more secure cloud computing environment.
|
author2 |
YANG, SHIN-JER |
author_facet |
YANG, SHIN-JER LI, YU-ZHAN 李毓展 |
author |
LI, YU-ZHAN 李毓展 |
spellingShingle |
LI, YU-ZHAN 李毓展 Design Issues of Enhanced DDoS Protecting Scheme under the Cloud Computing Environment |
author_sort |
LI, YU-ZHAN |
title |
Design Issues of Enhanced DDoS Protecting Scheme under the Cloud Computing Environment |
title_short |
Design Issues of Enhanced DDoS Protecting Scheme under the Cloud Computing Environment |
title_full |
Design Issues of Enhanced DDoS Protecting Scheme under the Cloud Computing Environment |
title_fullStr |
Design Issues of Enhanced DDoS Protecting Scheme under the Cloud Computing Environment |
title_full_unstemmed |
Design Issues of Enhanced DDoS Protecting Scheme under the Cloud Computing Environment |
title_sort |
design issues of enhanced ddos protecting scheme under the cloud computing environment |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/74132183381232999660 |
work_keys_str_mv |
AT liyuzhan designissuesofenhancedddosprotectingschemeunderthecloudcomputingenvironment AT lǐyùzhǎn designissuesofenhancedddosprotectingschemeunderthecloudcomputingenvironment AT liyuzhan yúnduānhuánjìngxiàgǎiliángshìddosfángyùjīzhìzhīyánjiū AT lǐyùzhǎn yúnduānhuánjìngxiàgǎiliángshìddosfángyùjīzhìzhīyánjiū |
_version_ |
1718540347382956032 |