Study on DDoS attacks based on DPDK in cloud computing

Xutao Zhao
{"title":"Study on DDoS attacks based on DPDK in cloud computing","authors":"Xutao Zhao","doi":"10.1109/CIACT.2017.7977325","DOIUrl":null,"url":null,"abstract":"DDoS (distributed denial of service attack) is a common and destructive network attack. In order to minimize the impact of network equipments and protect cloud platform user'security, this paper puts forward a prevention strategy based on DPDK. The BP algorithm is applied to the abnormal traffic detection module and DPDK is used to process network packet in user mode. This kind of mode not only improves the DDoS detection rate but also makes full use of the CPU's powerful computation ability, which greatly enhances the efficiency of real-time processing.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIACT.2017.7977325","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

DDoS (distributed denial of service attack) is a common and destructive network attack. In order to minimize the impact of network equipments and protect cloud platform user'security, this paper puts forward a prevention strategy based on DPDK. The BP algorithm is applied to the abnormal traffic detection module and DPDK is used to process network packet in user mode. This kind of mode not only improves the DDoS detection rate but also makes full use of the CPU's powerful computation ability, which greatly enhances the efficiency of real-time processing.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云计算中基于DPDK的DDoS攻击研究
分布式拒绝服务攻击(DDoS)是一种常见的破坏性网络攻击。为了最大限度地减少对网络设备的影响,保护云平台用户的安全,本文提出了一种基于DPDK的防范策略。异常流量检测模块采用BP算法,用户模式下使用DPDK处理网络报文。这种模式不仅提高了DDoS的检测率,而且充分利用了CPU强大的计算能力,大大提高了实时处理的效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Smart solar tracking system for optimal power generation SVM with Gaussian kernel-based image spam detection on textual features Comparison between LDA & NMF for event-detection from large text stream data Research on the wisdom education platform of cloud computing architecture Robust TS fuzzy controller for helicopter via parallel distributed compensation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1