A 2 M: Access-Assured Mobile Desktop Computing
Oh la la
Your session has expired but donâ€™t worry, your message
has been saved.Please log in and weâ€™ll bring you back
to this page. Youâ€™ll just need to click â€śSendâ€ť.
Your evaluation is of great value to our authors and readers. Many thanks for your time.
When you're done, click "publish"
Only blue fields are mandatory.
Your mailing list is currently empty.
It will build up as you send messages
and links to your peers.
besides you has access to this list.
Enter the e-mail addresses of your recipients in the box below. Note: Peer Evaluation will NOT store these email addresses log in
Your message has been sent.
Full text for this article was not available? Send a request to the author(s)
: A 2 M: Access-Assured Mobile Desktop Computing
Abstract : Abstract. Continued improvements in network bandwidth, cost, and ubiquitous access are enabling service providers to host desktop computing environments to address the complexity, cost, and mobility limitations of today’s personal computing infrastructure. However, distributed denial of service attacks can deny use of such services to users. We present A 2 M, a secure and attack-resilient desktop computing hosting infrastructure. A 2 M combines a stateless and secure communication protocol, a single-hop Indirection-based network (IBN) and a remote display architecture to provide mobile users with continuous access to their desktop computing sessions. Our architecture protects both the hosting infrastructure and the client’s connections against a wide range of service disruption attacks. Unlike any other DoS protection system, A 2 M takes advantage of its low-latency remote display mechanisms and asymmetric traffic characteristics by using multipath routing to send a small number of replicas of each packet transmitted from client to server. This packet replication through different paths, diversifies the client-server communication, boosting system resiliency and reducing end-toend latency. Our analysis and experimental results on PlanetLab demonstrate that A 2 M significantly increases the hosting infrastructure’s attack resilience even for wireless scenarios. Using conservative ISP bandwidth data, we show that we can protect against attacks involving thousands (150, 000) attackers, while providing good performance for multimedia and web applications and basic GUI interactions even when up to 30 % and 50%, respectively, of indirection nodes become unresponsive. 1
: Computer Science
Leave a comment
This contribution has not been reviewed yet. review?