[1]张伟,解争龙. 基于私有云泄漏的攻击方法研究[J].计算机技术与发展,2015,25(06):124-127.
 ZHANG Wei,XIE Zheng-long. Research on Attack Method Based on Private Cloud Leak[J].,2015,25(06):124-127.
点击复制

 基于私有云泄漏的攻击方法研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年06期
页码:
124-127
栏目:
安全与防范
出版日期:
2015-06-10

文章信息/Info

Title:
 Research on Attack Method Based on Private Cloud Leak
文章编号:
1673-629X(2015)06-0124-04
作者:
 张伟解争龙
 咸阳师范学院 信息工程学院
Author(s):
 ZHANG WeiXIE Zheng-long
关键词:
 私有云云计算隐私泄漏攻击算法
Keywords:
 private cloudscloud computingprivacy leakattack algorithm
分类号:
TP309.2
文献标志码:
A
摘要:
 为了解决云计算框架所面临的威胁,提出了针对私有云间隐私泄漏攻击的最优攻击选择算法。该方法根据最优攻击选择算法选择攻击对象,然后发起攻击,攻击造成私有云间的路径发生拥塞,迫使私有云改变路径;与此同时发起对其他路径的攻击,进而控制其他路径,从而实现对私有云间通信的控制,通过对被控制路径的监听完成隐私窃取,最后对攻击方法进行了实现。实验结果表明,该方法能够有效地控制私有云间的通信,从而达到对私用云侦测的目的,为保护私有云间信息的攻击提供参考。
Abstract:
 In order to solve the threats in cloud computing framework,the algorithm of optimal selection attacking on private clouds priva-cy leaking is proposed. Using the optimal selection algorithm to choose attacked object and attack,causing the path congestion between the private clouds,forcing the clouds to change another communication path. Simultaneously,attack the other paths,and then control the other paths,so as to realize the control of communication between the private clouds,completing privacy stealing by monitoring the con-trolled paths. Finally,the attack method is realized. The experimental results show that this method can effectively control the communica-tion between private clouds,so as to achieve the aim of the private cloud detection,providing an reference for protecting the information between private cloud to be attacked.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(06):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(06):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(06):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(06):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(06):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(06):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(06):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(06):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(06):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(06):47.
[11]谭天,袁嵩,肖洁. 云计算安全问题研究[J].计算机技术与发展,2016,26(09):124.
 TAN Tian,YUAN Song,XIAO Jie. Research on Security Issues of Cloud Computing[J].,2016,26(06):124.

更新日期/Last Update: 2015-08-05