首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 312 毫秒
1.
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud-based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively.  相似文献   

2.
Cloud is an emerging computing paradigm. It has drawn extensive attention from both academia and industry. But its security issues have been considered as a critical obstacle in its rapid development. When data owners store their data as plaintext in cloud, they lose the security of their cloud data due to the arbitrary accessibility, specially accessed by the un-trusted cloud. In order to protect the confidentiality of data owners' cloud data, a promising idea is to encrypt data by data owners before storing them in cloud. However, the straightforward employment of the traditional encryption algorithms can not solve the problem well, since it is hard for data owners to manage their private keys, if they want to securely share their cloud data with others in a fine-grained manner. In this paper, we propose a fine-grained and heterogeneous proxy re-encryption (FH- PRE) system to protect the confidentiality of data owners' cloud data. By applying the FH-PRE system in cloud, data owners' cloud data can be securely stored in cloud and shared in a fine-grained manner. Moreover, the heteroge- neity support makes our FH-PRE system more efficient than the previous work. Additionally, it provides the secure data sharing between two heterogeneous cloud systems, which are equipped with different cryptographic primitives.  相似文献   

3.
Video streaming services are trending to be deployed on cloud. Cloud computing offers better stability and lower price than traditional IT facilities. Huge storage capacity is essential for video streaming service. More and more cloud providers appear so there are increasing cloud platforms to choose. A better choice is to use more than one data center, which is called multi-cloud. In this paper a closed-loop approach is proposed for optimizing Quality of Service (QoS) and cost. Modules of monitoring and controlling data centers are required as well as the application feedback such as video streaming services. An algorithm is proposed to help choose cloud providers and data centers in a multi-cloud environment as a video service manager. Performance with different video service workloads are evaluated. Compared with using only one cloud provider, dynamically deploying services in multi-cloud is better in aspects of both cost and QoS. If cloud service costs are different among data centers, the algorithm will help make choices to lower the cost and keep a high QoS.  相似文献   

4.
Efficient schemes for securing network coding against wiretapping   总被引:1,自引:1,他引:0  
Existing solutions for secure network coding either bring significant bandwidth overhead or incur a high computa- tional complexity. For exploiting low-overhead mechanism for secure network coding against wiretapping, three efficient schemes are proposed for the applications with different security requirements. The basic idea behind this paper is first to encrypt a small part of source vectors and then subject the remaining original source vectors and the encrypted vectors to a special linear transformation. Also, a lightweight version of this scheme is then presented for resource-constrained networks. Moreover, an extensive scheme with enhanced security is also considered. All proposals are shown to have properties of lower security complexity and smaller bandwidth usage compared with the existing solutions. Also, the proposals can be easy to achieve flexible levels of security for various applications.  相似文献   

5.
Identity Based Group Key Agreement in Multiple PKG Environment   总被引:2,自引:0,他引:2  
Secure and reliable group communication is an increasingly active research area by growing popularity in group-oriented and collaborative applications. In this paper, we propose the first identity-based authenticated group key agreement in multiple private key generators (PKG) environment. It is inspired on a new two-party identity-based key agreement protocol first proposed by Hoonjung Lee et al. In our scheme, although each member comes from different domain and belongs to different PKGs which do not share the common system parameters, they can agree on a shared secret group key. We show that our scheme satisfies every security requirements of the group key agreement protocols.  相似文献   

6.
In this paper, NetSLab network platform for remote collaborative pseudo-dynamic testing, which was developed recently by a research group led by the Hunan University, is presented. Aiming at MTS system which is widely used in structural testing, the control method with acquisition board was investigated in this study to realize the communication interface between NetSLab and MTS system, and open up the remote collaborative pseudo-dynamic testing system. Using the developed testing system, a collaborative pseudo-dynamic testing on LAN was carried out successfully. The result manifests that the data transmission and collaborative control can be implemented accurately between NetSLab and MTS system, so that the usability of the testing system is validated.  相似文献   

7.
At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model of IaaS.After analyzing the vulnerabilities performance of IaaS cloud computing system,the mapping relationship was established between the vulnerabilities of IaaS and the nine threats of cloud computing which was released by cloud security alliance(CSA).According to the mapping relationship,a model for evaluating security of IaaS was proposed which verified the effectiveness of the model on OpenStack by the analytic hierarchy process(AHP) and the fuzzy evaluation method.  相似文献   

8.
Key management is a fundamental security service in wireless sensor networks. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper, we describe the design and implementation of an efficient key management scheme based on low energy adaptive clustering hierarchy(LEACH) for wireless sensor networks. The design of the protocol is motivated by the observation that many sensor nodes in the network play different roles. The paper presents different keys are set to the sensors for meeting different transmitting messages and variable security requirements. Simulation results show that our key management protocol based-on LEACH can achieve better performance. The energy consumption overhead introduced is remarkably low compared with the original Kerberos schemes.  相似文献   

9.
Power system security and reliability are more complex issues in a deregulated environment.Various criteria have been considered for power system reliability. In the day-ahead market, a successful trade schedule should be able to accept various disturbances with sufficient flexibility to be adjusted during the re-dispatch process. This paper describes the dispatch liquidity theory and some liquidity indices. The liquidity indices evaluate the effective operating reserves with the network constraints taken into consideration. A model is presented to calculate the liquidity index. An extended trade scheduling model with minimum liquidity index constraints is presented that considers the distribution requirements of the operating reserves. The liquidity indices could also be used to coordinate the security and reliability between multistage markets and for contingency selection. The algorithms were tested with real power system data. The results show that the dispatch liquidity theory is reasonable and the algorithms are effective.  相似文献   

10.
The complexity of solving large business and scientific problems demands higher requirements one xisting IT enviroment of the concerned institutions. An increase in complexity is often couple with demands to deliver various different Qualities of Service (QoS), relating for example to response time,throughput, availability, security and/or co-allocation of multiple resource types. In many cases it is not enough just to deliver the required QoS in a straight for ward way but the delivery also has to satisfy requirements with respect to timing, load distribution and security among others. Because of this outsourcing of such coordinated QoS (CQoS)is getting more and more common. The connection and collaboration of different resources across system boundaries and control domains is a promising approach for executing such large-scale resource and coordiation intensive jobs.  相似文献   

11.
Internet安全报警数据中心是应对大规模网络安全威胁的重要基础设施之一.文章提出了一种利用数据中心度量本地网络安全威胁的方法.在系统漏洞扫描分析的基础上,引入端口攻击趋势的概念,利用外部数据中心数据计算攻击趋势.使本地系统的威胁评估与当前网络安全状况相结合,重新计算系统的安全威胁评分,实现了一个原型验证了所设计的方...  相似文献   

12.
Virtual Machine(VM) allocation for multiple tenants is an important and challenging problem to provide efficient infrastructure services in cloud data centers. Tenants run applications on their allocated VMs, and the network distance between a tenant's VMs may considerably impact the tenant's Quality of Service(Qo S). In this study, we define and formulate the multi-tenant VM allocation problem in cloud data centers, considering the VM requirements of different tenants, and introducing the allocation goal of minimizing the sum of the VMs' network diameters of all tenants. Then, we propose a Layered Progressive resource allocation algorithm for multi-tenant cloud data centers based on the Multiple Knapsack Problem(LP-MKP). The LP-MKP algorithm uses a multi-stage layered progressive method for multi-tenant VM allocation and efficiently handles unprocessed tenants at each stage. This reduces resource fragmentation in cloud data centers, decreases the differences in the Qo S among tenants, and improves tenants' overall Qo S in cloud data centers. We perform experiments to evaluate the LP-MKP algorithm and demonstrate that it can provide significant gains over other allocation algorithms.  相似文献   

13.
李茜 《广西科学院学报》2013,29(2):89-91,102
针对国家信息系统安全等级保护体系中第三等级的所提出的关键技术要求,结合某高职院校数据中心在网络环境、主机服务、应用程序和数据管理等方面的实际情况,提出一个基于等级保护的高校数据中心信息系统安全体系设计方案。  相似文献   

14.
云计算代表一种全新的计算模型,并从根本上改变IT服务的方方面面。云环境的主要优势在于降低数据中心的成本支出,并在需要资源时获得动态接入,而不需耗费人力、时间,不影响工作人员的效率和组织竞争力。但云计算仍然存在一些网络性能和安全的问题。所有运营云的企业、政府机构和服务提供商,还有支持云基础设施的设备提供商必须在其设计中考虑这些因素。可用云性能和安全测试工具检测云应有的性能,以实现其结果。  相似文献   

15.
云计算的安全性既要面对传统信息技术带来的安全威胁,又要面对云计算核心技术,如虚拟化带来的新风险。根据经典的以安全策略(policy)、保护(protection)、检测(detection)和响应(response)为核心的安全模型—PPDR模型,结合笔者在云服务商工作积累的多年安全实践,论述了云计算安全体系设计与实现的关键技术,包括网络、主机、应用、数据和运维运营5个层面的安全设计与实现,并对云计算安全相关的技术趋势进行了展望。提出一种经实战检验的云计算安全体系的设计与实现,特别是数据安全体系的设计与实现。该体系上线3年来,已消减针对云平台99.99%以上的安全攻击,经受住了现网大规模安全实战的考验。  相似文献   

16.
云计算是IT产业的第三次变革, 已成为互联网信息服务研究的热点, 并且各种云计算的产品相继出现. 云计算大多采用强数据中心和弱终端的架构模式, 建设这种架构的云计算中心, 需要大量的资金投入, 并配置高速的网络访问环境. 目前中国的网络带宽还难以满足这种云计算框架下服务的需求; 同时, 众多云计算中心的建立也可能在一定程度上造成已有PC设备资源的浪费. 提出了一种基于动态用户融合的云计算服务架构, 该架构通过将有一定存储能力和计算能力的用户终端动态地融合到数据中心, 使得云计算中心的规模能够动态地扩展或收缩, 让用户能够为云服务中的其他用户提供服务. 基于该框架, 设计和实现一个云服务视频点播系统. 实验表明, 该框架能够在保持云服务质量的同时允许动态扩充云的规模.  相似文献   

17.
针对云计算环境下新型服务模式的引入以及虚拟化技术的使用为信息安全带来一系列新的安全隐患问题, 对公共云的安全性进行研究。从用户安全目标数据安全性和云服务可用性及性能两方面入手, 全面分析公共云面临的安全威胁。设计了公共云安全参考框架, 提出从用户管理、 数据安全、 数据中心软硬件安全和控制权转移引发的安全问题加强公共云安全性。最后对云安全评估进行了讨论。实验结果表明, 该结构能整体提高公共安全性, 抵御各类安全威胁。  相似文献   

18.
在研究云计算技术的基础上,构架了FTP服务器,并从解决目前网络安全问题的角度出发,研究了FTP云的安全性问题。  相似文献   

19.
随着5G网络的大规模商用,5G架构下的数据安全性和隐私保护成为当前研究的热点。传统的云计算,在5G网络环境中发展出移动边缘计算架构,继而发展出标准化的“雾计算”框架。为了保障雾计算框架中的数据安全和隐私保护,本研究引入区块链分布式安全机制进行安全认证和分片式非对称加密,并通过仿真实验进一步验证优化基础计算框架,从实验结果看,能够在保障数据安全的前提下显著降低时延,并形成了可实用的网络拓扑架构,将在各领域的5G大规模应用的数据安全和隐私保护中发挥作用。  相似文献   

20.
云计算是继网格技术后产生的新型计算模式,它的出现不仅仅是一种2.0时代的附属品,而是一场互联网时代的巨大改变。本文从云计算的概念入手,分析数字图书馆应用云计算的可行性,并根据云计算的特征和构成数字图书馆服务模式的要素从不同角度探讨了基于云计算环境下的一站式服务模式、平台服务模式、个性化服务模式、资源共建共享服务模式的云数字图书馆服务模式。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号