Data Center Protection Problems in the Zombie Network

Article Preview

Abstract:

With the development of the Botnet, new botnets use the peer-to-peer (P2P) protocol (such as for eMule download) appear, which have brought great challenges in detecting and preventing of botnet in the data center.27100Point to point protocol uses more decentralized control method, so information between each node can be shared, and each node has the function of connecting and recovering, which leads to that the class of Botnet is hard to be closed. In the protection of Botnet the data center also found that there are more and more botnet uses the high strength encryption technology after implanting into hosting, which makes the application layer information of the whole communication process be invisible to zombie network protection system for data centers , resulting in many missing events on the recognition and Influences the safety management effect. The specific point of view, point to point protocol and communication method based on encryption led to the that a data center in the botnet protection system is difficult to deal with effectively

You might also be interested in these eBooks

Info:

Periodical:

Pages:

948-950

Citation:

Online since:

January 2015

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chi Chen. Cloud computing security system. Science presses. In the 2014-6-1 s.

Google Scholar

[2] Hong Li, Hao Li. Trusted cloud security key technologies and implementation in China [D]. People's posts and telecommunications publishing house, 2010-06-01. In Chinese.

Google Scholar

[3] Ni Zhang. Cloud computing security technology and application. People's posts and telecommunications publishing house. In the 2014-05-01 s.

Google Scholar