• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Pan Yuting, Lin Li. A Trust-Based DDoS Discovery Approach for Encrypted Traffic in Cloud Environment[J]. Journal of Computer Research and Development, 2021, 58(4): 822-833. DOI: 10.7544/issn1000-1239.2021.20200183
Citation: Pan Yuting, Lin Li. A Trust-Based DDoS Discovery Approach for Encrypted Traffic in Cloud Environment[J]. Journal of Computer Research and Development, 2021, 58(4): 822-833. DOI: 10.7544/issn1000-1239.2021.20200183

A Trust-Based DDoS Discovery Approach for Encrypted Traffic in Cloud Environment

Funds: This work was supported by the National Natural Science Foundation of China (61502017) and the Scientific Research Common Program of Beijing Municipal Commission of Education (KM201710005024).
More Information
  • Published Date: March 31, 2021
  • In the cloud environment, DDoS(distributed denial of service) attacks may be more covert, easier to launch and potentially larger because data flow can be encrypted. A trust-based DDoS attack discovery approach for the encrypted traffic in the cloud environment called TruCTCloud is proposed. Firstly, a trust evaluation mechanism is introduced to filter the non-attack traffic of legitimate tenants by exploiting signature of the cloud service itself with the other environmental factors, and then the sensitive information contained in legitimate tenants’ traffic is guaranteed. Secondly, a traffic classification algorithm based on the kNN(k-nearest neighbors) is proposed to detect and identify for the filtered encrypted traffic and other unencrypted traffic, where five kinds of characteristics including flow median of packets per flow, flow median of bytes per flow, percentage of correlative flow, port growth rate and source IP growth rate are introduced to construct a Ball-tree data structure of characteristics. Finally, some experiments are conducted to evaluate the proposed method in the OpenStack cloud platform. The results suggest that our method can quickly detect the abnormal traffic or early traffic of DDoS attack and effectively protect the sensitive traffic information of legitimate users from the DDoS attack.
  • Cited by

    Periodical cited type(6)

    1. 王博,万良,叶金贤,刘明盛,孙菡迪. 融合稀疏注意力机制在DDoS攻击检测中的应用. 计算机工程与设计. 2024(05): 1312-1320 .
    2. 刘泽坤,宫鑫,刘秀,安龙,吕延滨,刘欣. 基于电力数据中台的行为审计工具建设. 电力大数据. 2024(02): 62-68 .
    3. 崔峻玮,翟亚红. 近邻成分分析下的DDoS攻击检测. 湖北汽车工业学院学报. 2023(02): 36-41 .
    4. 冯景瑜,张静,时翌飞. 物联网中具备终端匿名的加密流量双层过滤方法. 西安邮电大学学报. 2023(02): 72-81 .
    5. 王冲,魏子令,陈曙晖. 基于自注意力机制的无边界应用动作识别方法. 计算机研究与发展. 2022(05): 1092-1104 . 本站查看
    6. 邹福泰,俞汤达,许文亮. 基于隐马尔可夫模型的加密恶意流量检测. 软件学报. 2022(07): 2683-2698 .

    Other cited types(4)

Catalog

    Article views (564) PDF downloads (1054) Cited by(10)
    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return