Font Size: a A A

Design And Implementation Of A Cross Virtual-Physical Network Traceback System

Posted on:2015-10-30Degree:MasterType:Thesis
Country:ChinaCandidate:W Q ZhaoFull Text:PDF
GTID:2298330467463171Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Nowadays, the high speed growth and success of the Internet has changed the traditional basic services of our society. In the current society, the world has had a great dependence on the Internet. Internet is also becoming the ma-jor infrastructure of information society. Therefore, the security of the Internet played a important role for normal operation and development of the econo-my. However, due to Internet architecture’s defects and the rising of cloud computing, especially the emergence of virtual network, lead to many attacks which target to Internet facilities and services have a chance. Among the var-ious attacks, denial of service attacks are more common, and harmful to the Internet.This paper designs and implements a cross virtual-physical network trace-back system against denial of service attack, which aims at improving traceback accuracy and the security of the virtual-physical network, reducing the trace-back cost, and improving the overall traceback speed. This paper summarizes the characteristics of virtual-physical network,analyzes the advantages and de-fects of existing trace back algorithms, figure out the demands of the system design. Based on the requirement division, the system is divided into three level, including cross virtual-physical network traceback level, status of vir-tual network traceback level and Inner virtual network traceback level. Cross virtual-physical network trace back is used to decide the trace back direction between virtual network and physical network, and integrate the result of trace back. Status of virtual network trace back judge the status of virtual network to save the trace back resource. Inner virtual network trace back can main-tain the status of all virtual machines and use a hybrid trace back algorithm to accomplish the trace back task in the virtual network. These three levels close- ly cooperate to complete the task of tracebacking the denial of service attack. At last,we deploy the system into a testing network, and verify the traceback ability of the system.
Keywords/Search Tags:Network Security, Denial of Service, Traceback, Cloudcomputing, Virtual-physicm network
PDF Full Text Request
Related items