Computer and Modernization ›› 2022, Vol. 0 ›› Issue (11): 37-42.

Previous Articles     Next Articles

Communication Terminal Attack Behavior Identification Algorithm Based on Trusted Cloud Computing#br#

  

  1. (School of Data Science, Guangzhou Huashang College, Guangzhou 511300, China)
  • Online:2022-11-30 Published:2022-11-30

Abstract: Malicious attacks such as Trojan horse implantation pose a serious threat to communication terminals. Therefore, a communication terminal attack identification algorithm based on trusted cloud computing is proposed. The data acquisition module is used to obtain the data flow of the image of the communication terminal, and the trustworthiness chain is extended to the virtual machine manager and communication terminal of the cloud computing environment through the credibility verification mechanism. After detecting the credibility of the running environment of the communication terminal, the attack behavior identification module uses Bayesian algorithm to judge whether the data flow contains attack behavior. The maximum a posteriori probability of the attack behavior data is calculated to judge the category of the attack behavior, and the detection results are reflected to the management module. Combined with the rate limiting module, the data flow containing the attack behavior is limited until the end of the attack behavior of the communication terminal. The experimental results show that the algorithm can effectively improve the access security of the communication terminal and ensure the smooth transmission of data when the communication terminal is attacked. The average absolute percentage error of communication terminal attack behavior recognition under different degrees of interference environment is always less than 0.25%.

Key words: trusted cloud computing, communication terminal, aggressive behavior, data acquisition, rate limit, maximum a posteriori probability