SAPA-based approach for defending DoS attacks in cloud computing

Denial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached securi...

Full description

Saved in:
Bibliographic Details
Main Authors: Meng YUE, Kun LI, Zhi-jun WU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2017-04-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017079/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539537253171200
author Meng YUE
Kun LI
Zhi-jun WU
author_facet Meng YUE
Kun LI
Zhi-jun WU
author_sort Meng YUE
collection DOAJ
description Denial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached security access paths.Therefore,SAPA was more appropriate for cloud computing to defend DoS attacks.Based on the turn routing architecture of cloud computing,the mathematical model of SAPA was built and its performance was analyzed in theory.The performance of SAPA was tested in OMNeT++ experimental platform.Also,the Test-bed experiments were performed to evaluate the effectiveness of SAPA for defending DoS attack.Experimental results show that comparing with SOS,SAPA can degrade the impact of communication success rate caused by DoS attack effectively,and guarantees the access delay small enough.
format Article
id doaj-art-ccce33b7b6fb48319af46acd9ba95582
institution Kabale University
issn 1000-436X
language zho
publishDate 2017-04-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-ccce33b7b6fb48319af46acd9ba955822025-01-14T07:12:03ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-04-013812913959709206SAPA-based approach for defending DoS attacks in cloud computingMeng YUEKun LIZhi-jun WUDenial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached security access paths.Therefore,SAPA was more appropriate for cloud computing to defend DoS attacks.Based on the turn routing architecture of cloud computing,the mathematical model of SAPA was built and its performance was analyzed in theory.The performance of SAPA was tested in OMNeT++ experimental platform.Also,the Test-bed experiments were performed to evaluate the effectiveness of SAPA for defending DoS attack.Experimental results show that comparing with SOS,SAPA can degrade the impact of communication success rate caused by DoS attack effectively,and guarantees the access delay small enough.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017079/cloud computingDoS attacksecure access path algorithmdefense
spellingShingle Meng YUE
Kun LI
Zhi-jun WU
SAPA-based approach for defending DoS attacks in cloud computing
Tongxin xuebao
cloud computing
DoS attack
secure access path algorithm
defense
title SAPA-based approach for defending DoS attacks in cloud computing
title_full SAPA-based approach for defending DoS attacks in cloud computing
title_fullStr SAPA-based approach for defending DoS attacks in cloud computing
title_full_unstemmed SAPA-based approach for defending DoS attacks in cloud computing
title_short SAPA-based approach for defending DoS attacks in cloud computing
title_sort sapa based approach for defending dos attacks in cloud computing
topic cloud computing
DoS attack
secure access path algorithm
defense
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017079/
work_keys_str_mv AT mengyue sapabasedapproachfordefendingdosattacksincloudcomputing
AT kunli sapabasedapproachfordefendingdosattacksincloudcomputing
AT zhijunwu sapabasedapproachfordefendingdosattacksincloudcomputing