J4 ›› 2014, Vol. 41 ›› Issue (3): 116-122.doi: 10.3969/j.issn.1001-2400.2014.03.017

• 研究论文 • 上一篇    下一篇

云环境下的“云滴冻结”攻击

王一川;马建峰;卢笛;张留美;孟宪佳   

  1. (西安电子科技大学 计算机学院,陕西 西安  710071)
  • 收稿日期:2013-09-17 出版日期:2014-06-20 发布日期:2014-07-10
  • 通讯作者: 王一川
  • 作者简介:王一川(1983-),男,西安电子科技大学博士研究生,E-mail: ctechsky@gmail.com.
  • 基金资助:

    长江学者和创新团队发展计划资助项目(IRT1078);国家自然基金重点资助项目(2011ZX03005-002);中央高校基本科研业务费资助项目(JY0900120301);国家科技重大专项资助项目(2012ZX03002003)

Cloud droplets freezing attack in cloud computing

WANG Yichuan;MA Jianfeng;LU Di;ZHANG Liumei;MENG Xianjia   

  1. (School of Computer Science and Technology, Xidian Univ., Xi'an  710071, China)
  • Received:2013-09-17 Online:2014-06-20 Published:2014-07-10
  • Contact: WANG Yichuan

摘要:

根据云计算环境下服务器集群部署的特征,提出一种新型的、实用的分布式拒绝服务攻击模型——“云滴冻结”攻击.实验表明,攻击者可通过控制受感染的僵尸虚拟机发动该攻击,不仅使云服务器集群的内部网络带宽产生严重的拥塞,而且极大地消耗了物理主机的内存和CPU等资源.该攻击通过非法占用原本分配给合法虚拟机的资源,从而达到拒绝服务的效果.通过量化分析攻击原理,结合传统拒绝服务攻击和防御相关技术,讨论了防御“云滴冻结”攻击的思路.

关键词: 云计算, 分布式拒绝服务攻击, 网络安全, 僵尸网络

Abstract:

This paper proposes a novel and practical distributed denial-of-service attack model—cloud droplets freezing attack, by studying the characteristics of the server cluster deployment in cloud computing context. Experimental results show that the attacker can control the infected virtual machine to launch the attack. Such an attack not only produces a serious congestion effect to the internal network bandwidth of cloud server clusters, but also exhausts physical host resources such as memory and CPU. To achieve effective denial-of-service attacks, the attack illegally occupies resources that are originally assigned to a legitimate virtual machine. Combined with the defense related technologies toward traditional denial-of-service attack and the quantitative analysis of the principle of the Cloud droplets attack, the paper discusses the Cloud droplets freezing defense methods.

Key words: cloud computing, distributed denial of service attack, network security, botnet

中图分类号: 

  • TP309
Baidu
map