信息网络安全 ›› 2015, Vol. 15 ›› Issue (6): 67-72.doi: 10.3969/j.issn.1671-1122.2015.06.011

• 技术研究 • 上一篇    下一篇

模拟DDoS攻击场景下的云取证模型的研究

李洁1, 许鑫1, 陈宇1, 张丁文2()   

  1. 1.国网吉林省电力有限公司电力科学研究院,吉林长春 130021
    2.吉林大学计算机科学与技术学院,吉林长春 130012
  • 收稿日期:2015-04-27 出版日期:2015-06-20 发布日期:2018-07-16
  • 作者简介:

    作者简介: 李洁(1967-),女,吉林,高级工程师,硕士,主要研究方向:信息安全管理;许鑫(1982-),男,辽宁,工程师,博士,主要研究方向:信息安全技术及自然计算;陈宇(1982-),男,吉林,工程师,硕士,主要研究方向:信息安全技术;张丁文(1990-),男,吉林,硕士研究生,主要研究方向:信息安全。

  • 基金资助:
    国家自然科学基金[61103197];吉林省重点科技攻关项目[20150204035GX]

Research on Cloud Forensics Model under the Simulation DDoS Attack Scenarios

LI Jie1, XU Xin1, CHEN Yu1, ZHANG Ding-wen2()   

  1. 1.Jilin Grid Electric Power Research Institute of China Grid, Changchun Jilin 130021, China
    2. College of Computer Science and Technology, Jilin University, Changchun Jilin 130012, China
  • Received:2015-04-27 Online:2015-06-20 Published:2018-07-16

摘要:

云计算是一种新型的计算概念,它以开放的标准和服务为基础,以互联网为中心,让互联网上的各种计算资源协同工作,共同组成数个庞大的数据中心和计算中心,为各类用户提供安全、快速、便捷的数据存储和网络计算等特定服务。云计算环境下互联网面临着更多的计算机犯罪问题,给取证工作带来了极大的挑战:一方面要对已经发生的攻击进行证据的收集与分析,另一方面也为防范攻击的技术手段收集实验数据。云计算环境是攻击者新的攻击对象,一旦攻击成功,其带来的损失将直接影响最终用户的数据安全性和数据完整性。在众多攻击当中,DDos攻击是云计算平台最容易发生且难以防范的攻击之一。因此,文章针对云环境面临的DDoS攻击问题展开研究,对相关工作进行总结,提出了一种模拟DDoS攻击场景下的云取证框架模型。

关键词: DDoS攻击, 云计算, 云取证

Abstract:

Cloud computing is a new type of computing concept. It is based on open standards and services, and it is centered on the Internet. It makes all kinds of resources on the Internet to work together, which constitutes some huge data centers and computing centers, offering the safe, fast and convenient data storage and network computing services for all kinds of users. Under the cloud computing environment, the Internet is facing more and more computer crimes, bringing great challenges to forensic work. On the one hand, the evidences of the attacks that have taken place should be collected and analyzed. On the other hand, experimental data should be collected for the technical means of preventing attacks. Cloud computing environment is the attacker's new target, and once the attack is successful, the losses will directly affect the users' data security and data integrity. Among the attacks, DDoS attack is still one of the attacks that occur most easily and most difficult to prevent on the cloud computing platform. This paper discusses the DDoS attack problems in the cloud computing environment, proposes a model of cloud forensics framework under the simulation DDoS attack scenarios on the basis of related work.

Key words: DDoS attack, cloud computing, cloud forensics

中图分类号: