Researches on Brittle Seam Mining Based Situation Assessment and Prediction Mechanism of DDoS Attacks in Cloud Computing Platform

Article Preview

Abstract:

According to the problem of Situation Assessment and Prediction of DDoS Attacks in Cloud Computing Platform, the concepts of Brittle Point and Brittle seam were introduced to describe the situation of an eco-system according to ranked node availability, and a Situation Assessment and Prediction Mechanism based on the Brittle Seam Mining Algorithm was proposed. In the Brittle Seam Mining Algorithm, biological features of DDoS attacks and cloud computing platform were analyzed from the point of bio-dynamics, and the analysis results indicate that bandwidth loads of the normal user access from different populations wound not reach the brittle point of an eco-system, while bandwidth load of victim under DDOS attacks will reach the brittle point. The Biological Invasions Model such as the population diffusion reaction model and the population reproduction model are adopted to predict and detect the Brittle Point and Brittle seam. Meanwhile, the GIS technology was used in the visualization of Brittle seam. The simulation results verify the applicability of this method.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

262-270

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] J. van der Geer, J.A.J. Hanraads, R.A. Lupton, The art of writing a scientific article, J. Sci. Commun. 163 (2000) 51-59.

Google Scholar

[1] Ke Li. and Yifeng Lian: Computer Engineering and Applications. Vol. 49(2009), pp.88-91. (In Chinese).

Google Scholar

[2] Moyi Duan: Journal of Computer Applications. Vol. 32(2012), pp.1796-1798, 1803. (In Chinese).

Google Scholar

[3] Modi Chirag, Patel Dhiren, Borisaniya Bhavesh, et al.: Journal of network And Computer Applications. Vol. 36(2013), pp.42-57.

Google Scholar

[4] Chen Hao, Gaska Thomas, Chen Yu and Summerville Douglas H: Computers and Electrical Engineering. Vol. 39(2013): pp.295-308.

Google Scholar

[5] Liming Zheng, Peng Zou and Yan Jia: Journal of Computer Research and Development. Vol. 48(2011): pp.1506-1516. (In Chinese).

Google Scholar

[6] Bailian Li, Zhen Jin, Guiquan Sun and Quanxing Liu: Mathematical Models of Biological Invasion (Higher Education Press, Beijing 2013). (In Chinese).

Google Scholar