Font Size: a A A

Study On Detection Of DDoS Attacks In Cloud Computing

Posted on:2016-06-26Degree:MasterType:Thesis
Country:ChinaCandidate:W MengFull Text:PDF
GTID:2308330470461414Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Distributed denial of service(DDoS) attack is unable to make the normal users access to the target service through blocking network bandwidth or running out of server resources.It is one of the effective means of attacks that often happens,and its attack methods also change rapidly,which is a great threat to the security of the Internet; In the Internet era,cloud computing technology is not perfect,and the security issues of cloud computing has attracted more and more attention, cloud computing provider provides cloud computing services for customers at the same time, how to deal with the increasingly rampant DDoS attack has become a new challenge facing cloud computing security.In recent years, many researchers research on intrusion detection of DDoS attacks in cloud computing environment,and has achieved remarkable results.However,with the development of cloud computing, the existing intrusion detection system has yet to be further improved.The principle of DDoS attack and intrusion strategy in this paper is deeply studied, based on the analysis of cloud security,DDoS intrusion detection model is especially designed, which can improve the performance and efficiency of intrusion detection, and ensure the good cloud computing environment, this paper mainly completes the following achievements:First of all in the cloud environment the use of flow control technology based on NetFlow,analysis of the DDoS attack traffic characteristics in cloud environment, for monitoring the abnormal traffic in the cloud, ensuring the security and reliability of data flow in the network,using distributed triggering technology to make detected anomaly flow forward to the abnormal flow separation module,and then through the policy routing the normal traffic forwarding to the normal user.Secondly, based on the analysis of cloud computing and Cloud Architecture, combined with detection technology associated with abnormal flow in cloud computing environment, designing a distributed system of DDoS attack intrusion detection and defense based on cloud environment,focusing on design of anomaly flow intrusion detection model, distinguishing between normal traffic and abnormal traffic,putting forward normal flow to legitimate users.Finally,by comparing several attack detection algorithms,the improved BP algorithm is applied to anomaly flow detection module, through MATLAB to the training of the sample set and comparison of different attack simulation experiment results,the improved BP algorithm has very good detection rate and rate of false positives.Compared with the attack detection in cloud environment, it can be concluded that the detection of attack detection can not only save the historical data, but also improve the detection rate, reduce the false positive rate, greatly speed the detection rate.
Keywords/Search Tags:DDoS Attack, Intrusion Detection, Cloud Computing, BP Algorithm
PDF Full Text Request
Related items