DHT-based security infrastructure for trusted internet and grid computing

被引:5
作者
Hwang, Kai [1 ]
Cai, Min [1 ]
Kwok, Yu-Kwong [1 ]
Song, Shanshan [1 ]
Chen, Yu [1 ]
Chen, Ying [1 ]
机构
[1] Univ Southern Calif, Los Angeles, CA 90086 USA
基金
美国国家科学基金会;
关键词
security infrastructure; internet computing; grid computing; intrusion detection; worm containment; DDoS defence;
D O I
10.1504/IJCIS.2006.011348
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet.
引用
收藏
页码:412 / 433
页数:22
相关论文
共 21 条
[11]  
Kamvar S., 2003, P 12 INT C WORLD WID, P640, DOI DOI 10.1145/775152.775242
[12]  
Kim HA, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P271
[13]  
KODIALAM M, 2004, BELL LABS TECHNICAL
[14]  
Kwok Y-K., 2004, IEEE T PARALLEL DIST
[15]  
Kwok YK, 2005, 2005 IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, VOLS 1 AND 2, P1143
[16]  
Moore D, 2003, IEEE INFOCOM SER, P1901
[17]  
NAGARATNAM N, 2002, SECURITY ARCHITECTUR
[18]  
Osborne M. J., 1994, COURSE GAME THEORY
[19]  
Singh S, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P45
[20]  
Song S., 2005, P IEEE IPDPS