期刊文献+

多云环境下基于博弈论的用户行为分析模型 被引量:2

User Behavior Analysis Model Based on Game Theory under Multi-clouds Environment
在线阅读 下载PDF
导出
摘要 针对多云环境下用户的分布式拒绝服务攻击缺乏有效处理机制的现状,从云服务提供商收益角度出发,提出多云环境下基于博弈论的用户行为分析模型。模型首先基于博弈论构造收益矩阵,之后利用模糊隶属度函数判定用户的行为,并进一步评估非协作和协作场景下云服务提供商的资源消耗和收益。经仿真验证,协作模型能够在减少资源消耗的基础上,有效地降低云服务提供商遭受分布式拒绝服务攻击的风险,相对于非协作场景,可以将单位资源的收益提高3倍以上,具有很强的现实意义。 Aiming at the situation of lacking research on Distributed Denial of Service (DDoS) attack under multi-clouds environment,a user behavior analysis model based on game theory under multi-clouds environment was proposed from the perspective of cloud service provider.The model firstly constructs a payoff matrix based on game theory,and then it judges user behavior through fuzzy membership function,and evaluates the resource consumption and profit of cloud service provider under non-cooperation and cooperation scenarios.Simulations show that the proposed cooperation model can reduce resource consumption,lower the risk of DDoS attack for cloud service providers,and prompt the profit of each resource unit for more than three times,which takes an effective significance.
出处 《计算机科学》 CSCD 北大核心 2014年第4期120-125,共6页 Computer Science
基金 国家自然科学基金项目(60973146)资助
关键词 云计算 多云环境 模糊隶属度函数 博弈论 协作 Cloud computing Multi-clouds Fuzzy membership function Game theory Cooperation
作者简介 聂婷婷(1989-),女,硕士,主要研究方向为数学与信息安全,E-mail:nietingting89@126.com 郭玉翠(1962-),女,教授,主要研究方向为数学与信息安全.
  • 相关文献

参考文献13

  • 1陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348. 被引量:1314
  • 2Alok T,Abhinav M.Cloud Computing Security Considerations[C] ∥IEEE ISCPCC.Xian,China,2011:1-5.
  • 3A1Zain M A,Pardede E,Soh B,et al.Cloud Computing Security:From Single to Multi-Clouds[C] // HICSS.Hawaii,USA,2012:5490-5499.
  • 4AlZain M A,Soh B,Pardede E.MCDB:Using Multi-Clouds to,Ensure Security in Cloud Computing[C] //DASC.Sydney,Australia,2011:784-791.
  • 5Trostle J.Protecting Against Distributed Denial of service attacks Using Distributed Filtering[C] //Securecomm and Workshops.Baltimore,USA,2006:1-11.
  • 6Bhaskaran M,Natrarajan A M,Sivanandam S N.Tracebacking the Spoofed IP Packets in Multi ISP Domains with Secured Communication[C] //ICSCN.Chennai,India,2007:579-584.
  • 7Joshi B,Vijayan A S,Joshi B K.Securing Cloud Computing Environment Against DDoS Attacks[C] //ICCCI.Coimbatore,India,2012:1-5.
  • 8陈亚睿,田立勤,杨扬.云计算环境下基于动态博弈论的用户行为模型与分析[J].电子学报,2011,39(8):1818-1823. 被引量:38
  • 9Niyato D,Vasilakos A V.Resource and Revenue Sharing with Coalition Formation of Cloud Providers:Game Theoretic Approach[C] //CCGrid.Newport Beach,CA,USA,2011:215-224.
  • 10Karnwal T,Sivakumar T,Aghila G.A Comber Approach to Protect Cloud Copmputing against XML DDoS and HTTP DDoS attack[C] //SCEECS,Bhopal,India,2012:1-5.

二级参考文献45

  • 1Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
  • 2Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
  • 3Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403.
  • 4Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11.
  • 5Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28.
  • 6Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117.
  • 7Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003.29-43.
  • 8Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters. In: Proc. of the 6th Symp. on Operating System Design and Implementation. Berkeley: USENIX Association, 2004. 137-150.
  • 9Burrows M. The chubby lock service for loosely-coupled distributed systems. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 335-350.
  • 10Chang F, Dean J, Ghemawat S, Hsieh WC, Wallach DA, Burrows M, Chandra T, Fikes A, Gruber RE. Bigtable: A distributed storage system for structured data. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 205-218.

共引文献1366

同被引文献13

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部