{"title":"Study on DDoS attacks based on DPDK in cloud computing","authors":"Xutao Zhao","doi":"10.1109/CIACT.2017.7977325","DOIUrl":null,"url":null,"abstract":"DDoS (distributed denial of service attack) is a common and destructive network attack. In order to minimize the impact of network equipments and protect cloud platform user'security, this paper puts forward a prevention strategy based on DPDK. The BP algorithm is applied to the abnormal traffic detection module and DPDK is used to process network packet in user mode. This kind of mode not only improves the DDoS detection rate but also makes full use of the CPU's powerful computation ability, which greatly enhances the efficiency of real-time processing.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIACT.2017.7977325","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
DDoS (distributed denial of service attack) is a common and destructive network attack. In order to minimize the impact of network equipments and protect cloud platform user'security, this paper puts forward a prevention strategy based on DPDK. The BP algorithm is applied to the abnormal traffic detection module and DPDK is used to process network packet in user mode. This kind of mode not only improves the DDoS detection rate but also makes full use of the CPU's powerful computation ability, which greatly enhances the efficiency of real-time processing.