DHT-based security infrastructure for trusted internet and grid computing

被引:5
作者
Hwang, Kai [1 ]
Cai, Min [1 ]
Kwok, Yu-Kwong [1 ]
Song, Shanshan [1 ]
Chen, Yu [1 ]
Chen, Ying [1 ]
机构
[1] Univ Southern Calif, Los Angeles, CA 90086 USA
基金
美国国家科学基金会;
关键词
security infrastructure; internet computing; grid computing; intrusion detection; worm containment; DDoS defence;
D O I
10.1504/IJCIS.2006.011348
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet.
引用
收藏
页码:412 / 433
页数:22
相关论文
共 21 条
[1]  
[Anonymous], TECHNOLOGIES, DOI [DOI 10.1145/383059.383071, DOI 10.1002/HBE2.141]
[2]   Collaborative Internet worm containment [J].
Cai, M ;
Hwang, K ;
Kwok, YK ;
Song, S ;
Chen, Y .
IEEE SECURITY & PRIVACY, 2005, 3 (03) :25-33
[3]  
Cai M., 2005, IEEE T DEPENDABLE SE
[4]  
Chen Y, 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, P123
[5]  
CHEN Y, 2006, J PARALLEL DISTRIBUT, V66
[6]  
Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
[7]  
Durand M, 2003, LECT NOTES COMPUT SC, V2832, P605
[8]  
Foster I, 2001, J GRID COMPUT, V15, P200, DOI DOI 10.1007/S10723-005-5465-X
[9]  
Hwang K, 2005, LECT NOTES COMPUT SC, V3516, P187
[10]  
HWANG K, 2005, P IEEE WORKSH SEC SY