SAPA-based approach for defending DoS attacks in cloud computing
Denial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached securi...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2017-04-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017079/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539537253171200 |
---|---|
author | Meng YUE Kun LI Zhi-jun WU |
author_facet | Meng YUE Kun LI Zhi-jun WU |
author_sort | Meng YUE |
collection | DOAJ |
description | Denial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached security access paths.Therefore,SAPA was more appropriate for cloud computing to defend DoS attacks.Based on the turn routing architecture of cloud computing,the mathematical model of SAPA was built and its performance was analyzed in theory.The performance of SAPA was tested in OMNeT++ experimental platform.Also,the Test-bed experiments were performed to evaluate the effectiveness of SAPA for defending DoS attack.Experimental results show that comparing with SOS,SAPA can degrade the impact of communication success rate caused by DoS attack effectively,and guarantees the access delay small enough. |
format | Article |
id | doaj-art-ccce33b7b6fb48319af46acd9ba95582 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2017-04-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-ccce33b7b6fb48319af46acd9ba955822025-01-14T07:12:03ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-04-013812913959709206SAPA-based approach for defending DoS attacks in cloud computingMeng YUEKun LIZhi-jun WUDenial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached security access paths.Therefore,SAPA was more appropriate for cloud computing to defend DoS attacks.Based on the turn routing architecture of cloud computing,the mathematical model of SAPA was built and its performance was analyzed in theory.The performance of SAPA was tested in OMNeT++ experimental platform.Also,the Test-bed experiments were performed to evaluate the effectiveness of SAPA for defending DoS attack.Experimental results show that comparing with SOS,SAPA can degrade the impact of communication success rate caused by DoS attack effectively,and guarantees the access delay small enough.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017079/cloud computingDoS attacksecure access path algorithmdefense |
spellingShingle | Meng YUE Kun LI Zhi-jun WU SAPA-based approach for defending DoS attacks in cloud computing Tongxin xuebao cloud computing DoS attack secure access path algorithm defense |
title | SAPA-based approach for defending DoS attacks in cloud computing |
title_full | SAPA-based approach for defending DoS attacks in cloud computing |
title_fullStr | SAPA-based approach for defending DoS attacks in cloud computing |
title_full_unstemmed | SAPA-based approach for defending DoS attacks in cloud computing |
title_short | SAPA-based approach for defending DoS attacks in cloud computing |
title_sort | sapa based approach for defending dos attacks in cloud computing |
topic | cloud computing DoS attack secure access path algorithm defense |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017079/ |
work_keys_str_mv | AT mengyue sapabasedapproachfordefendingdosattacksincloudcomputing AT kunli sapabasedapproachfordefendingdosattacksincloudcomputing AT zhijunwu sapabasedapproachfordefendingdosattacksincloudcomputing |