ID |
原文 |
译文 |
47486 |
分布式拒绝服务(DDoS)是攻击者通过入侵云内虚拟机组成攻击网络,以威胁多租户云系统安全的攻击。 |
An attacker compromised a number of VMs in the cloud to form his own network to launch a powerful distri-buted denial of service (DDoS) attack. DDoS attack is a serious threat to multi-tenant cloud. |
47487 |
多租户云系统 DDoS 攻击检测难点在于如何确定攻击源虚拟机和攻击目标,尤其当攻击目标为云内主机时。 |
It is difficult to detect whichVM in the cloud are compromised and what is the attack target, especially when the VM in the cloud is the victim. |
47488 |
提出一种基于熵度量的 DDoS 攻击检测方法,根据云环境特点在优先定位攻击源基础上再确定攻击目标,检测多租户云系统内发起的 DDoS 攻击。 |
ADDoS detection method was presented suitable for multi-tenant cloud environment by identifying the malicious VM at-tack sources first and then the victims. |
47489 |
提出分布式检测架构, |
A distributed detection framework was proposed. |
47490 |
利用检测代理发现潜在攻击源端的可疑攻击流量, |
The distributed agent detects thesuspicious VM which generate the potential DDoS attack traffic flows on the source side. |
47491 |
检测服务器识别 DDoS 攻击的真正攻击流。 |
A central server confirms thereal attack flows. |
47492 |
理论和实验分析验证了提出方法的可行性和有效性。 |
The feasibility and effectiveness of the proposed detection method are verified by experiments in themulti-tenant cloud environment. |
47493 |
非对称密钥密码体制(公钥密码体制)在当今信息安全领域中扮演着重要的角色。 |
Asymmetric key cryptosystem plays an significant role in the field of information security. |
47494 |
与传统的公钥密码体制相比,基于标识的公钥密码体制简化了证书的管理,减少系统通信量和存储开销。 |
Compared with tra-ditional public key cryptosystem, the public key crypto system based on identity simplifies certificate management andreduces system communication and storage cost. |
47495 |
在分析了已有加密安全方案以及对比不同安全方案的优点及缺点后,介绍一种使用国密算法、基于标识密钥技术的证书集成管理平台及其所独具的优势。 |
A management platform and its unique merits were introduced afteranalyzing the current security schemes and comparing their various advantages and defects. |