Middleware-based approach for preventing distributed deny of service attacks

被引:0
作者
Wei, Y [1 ]
Dong, Y [1 ]
Wei, Z [1 ]
机构
[1] Texas A&M Univ, Dept Comp Sci, College Stn, TX 77843 USA
来源
2002 MILCOM PROCEEDINGS, VOLS 1 AND 2: GLOBAL INFORMATION GRID - ENABLING TRANSFORMATION THROUGH 21ST CENTURY COMMUNICATIONS | 2002年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we extend our previous study on VPOE (Virtual Private Operation Environment) to provide the DDOS (distributed deny of service) prevention service in a distributed heterogeneous environment. We introduce our integrated middleware-based defense system to support this service with studying two important components middleware box and domain agent. Our technology includes the following: (1) We adopt network-based middlewares. The network-based middleware is realized by special devices inserted in various locations of the network. Middlewares in the system cooperate to achieve the defense mission objectives. (2) We take the generic primitive and role-based approaches. With the network primitives, middlewares are programmable entities and can change their roles during the system run-time according to the system defense requirements. (3) We take the generic signaling strategy. With the generic signaling control protocols, middlewares can cooperate with each other effectively to achieve the high defense performance globally. There are several advantages with our approach: (1) Middlewares provide transparent services to applications and make our solution both upward and downward compatible. Thus, our technology can be easily deployed with the current computing and communication infrastructure. (2) Our solution is highly efficient. By using the generic middleware box control protocols and network primitives, the middleware boxes can cooperatively share the countermeasure information and easily change their roles run-time to efficiently prevent DDOS attack. In this sense, our defense system can adaptively deploy the defense strategy according to the dynamic network attack situation. As a result, our technology is effective and can be used in a large system.
引用
收藏
页码:1124 / 1129
页数:6
相关论文
共 50 条
  • [31] ZENTURIO: a grid middleware-based tool for experiment management of parallel and distributed applications
    Prodan, R
    Fahringer, T
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2004, 64 (06) : 693 - 707
  • [32] Preventing distributed denial of service attacks with alert correlation
    Bouzida, Y
    Autrel, F
    Cuppens, F
    Gombault, S
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 778 - 781
  • [33] Middleware-based enterprise application integration
    Yuan, Lin
    Xu, Linying
    Chen, Shan
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (07): : 82 - 84
  • [34] Middleware-Based Sensor Web Integration
    Tian, Yudong
    Geiger, James V., Jr.
    Su, Hongbo
    Kumar, Sujay V.
    Houser, Paul R.
    IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2010, 3 (04) : 467 - 472
  • [35] The middleware-based architectural approach for opening and evolving healthcare information systems
    Ferrara, FM
    MEDICAL INFORMATICS EUROPE '96: HUMAN FACETS IN INFORMATION TECHNOLOGIES, 1996, 34 : 264 - 270
  • [36] Middleware-based Management for Smart Grids
    Villa, D.
    Martin, C.
    Villanueva, F. J.
    Moya, F.
    Lopez, J. C.
    IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE 2011), 2011, : 545 - 546
  • [37] A perspective on the future of middleware-based software engineering
    Issarny, Valerie
    Caporuscio, Mauro
    Georgantas, Nikolaos
    FOSE 2007: FUTURE OF SOFTWARE ENGINEERING, 2007, : 244 - +
  • [38] A middleware-based platform for the integration of bioinformatic services
    Llambias, Guzman
    Ruggia, Raul
    PROCEEDINGS OF THE 2014 XL LATIN AMERICAN COMPUTING CONFERENCE (CLEI), 2014,
  • [39] Java middleware-based enterprise calculation model
    2000, Shanghai Comp Soc, China (26):
  • [40] A Middleware-Based Network Architecture for the Web of Things
    Sha, Jing
    Ji, Yang
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 506 - 510