计算机科学 ›› 2014, Vol. 41 ›› Issue (4): 120-125.

• 信息安全 • 上一篇    下一篇

多云环境下基于博弈论的用户行为分析模型

聂婷婷,郭玉翠   

  1. 北京邮电大学理学院 北京100876;北京邮电大学理学院 北京100876
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金项目(60973146)资助

User Behavior Analysis Model Based on Game Theory under Multi-clouds Environment

NIE Ting-ting and GUO Yu-cui   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对多云环境下用户的分布式拒绝服务攻击缺乏有效处理机制的现状,从云服务提供商收益角度出发,提出多云环境下基于博弈论的用户行为分析模型。模型首先基于博弈论构造收益矩阵,之后利用模糊隶属度函数判定用户的行为,并进一步评估非协作和协作场景下云服务提供商的资源消耗和收益。经仿真验证,协作模型能够在减少资源消耗的基础上,有效地降低云服务提供商遭受分布式拒绝服务攻击的风险,相对于非协作场景,可以将单位资源的收益提高3倍以上,具有很强的现实意义。

关键词: 云计算,多云环境,模糊隶属度函数,博弈论,协作

Abstract: Aiming at the situation of lacking research on Distributed Denial of Service (DDoS) attack under multi-clouds environment,a user behavior analysis model based on game theory under multi-clouds environment was proposed from the perspective of cloud service provider.The model firstly constructs a payoff matrix based on game theory,and then it judges user behavior through fuzzy membership function,and evaluates the resource consumption and profit of cloud service provider under non-cooperation and cooperation scenarios.Simulations show that the proposed cooperation model can reduce resource consumption,lower the risk of DDoS attack for cloud service providers,and prompt the profit of each resource unit for more than three times,which takes an effective significance.

Key words: Cloud computing,Multi-clouds,Fuzzy membership function,Game theory,Cooperation

[1] 陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348
[2] Alok T,Abhinav M.Cloud Computing Security Considerations[C]∥IEEE ISCPCC.Xian,China,2011:1-5
[3] AlZain M A,Pardede E,Soh B,et al.Cloud Computing Security:From Single to Multi-Clouds[C]∥HICSS.Hawaii,USA,2012:5490-5499
[4] AlZain M A,Soh B,Pardede E.MCDB:Using Multi-Clouds to Ensure Security in Cloud Computing[C]∥DASC. Sydney,Australia,2011:784-791
[5] Trostle J.Protecting Against Distributed Denial of service at-tacks Using Distributed Filtering[C]∥Securecomm and Workshops. Baltimore,USA,2006:1-11
[6] Bhaskaran M,Natrarajan A M,Sivanandam S N.Tracebacking the Spoofed IP Packets in Multi ISP Domains with Secured Communication[C]∥ICSCN.Chennai,India,2007:579-584
[7] Joshi B,Vijayan A S,Joshi B K.Securing Cloud Computing Environment Against DDoS Attacks[C]∥ ICCCI.Coimbatore,India,2012:1-5
[8] 陈亚睿,田立勤,杨扬.云计算环境下基于动态博弈论的用户行为模型与分析[J].电子学报,2011,8:1818-1823
[9] Niyato D,Vasilakos A V.Resource and Revenue Sharing withCoalition Formation of Cloud Providers:Game Theoretic Approach[C]∥CCGrid.Newport Beach,CA,USA,2011:215-224
[10] Karnwal T,Sivakumar T,Aghila G.A Comber Approach toProtect Cloud Copmputing against XML DDoS and HTTP DDoS attack[C]∥SCEECS,Bhopal,India,2012:1-5
[11] Chen Qi,Lin Wen-min,Dou Wan-chun,et al.CBF:A Packet Filtering Method for DDoS Attack Defense in Cloud Environment[C]∥DASC.Sydney,Australia,2011:427-434
[12] 谢立军,朱智强,孙磊,等.基于隶属度理论的云服务行为信任评估模型研究[J].计算机应用研究,2012,30(4):1051-1054
[13] Niyato D,Wang P,Hossain E,et al.Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments[C]∥WCNC.Shanghai,China,2012:3128-3133
[14] 张维迎.博弈论与信息经济学[M].上海:上海人民出版社,2004

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!