期刊文献+

LDDoS attack detection method based on wavelet decomposition and sliding windows

LDDoS attack detection method based on wavelet decomposition and sliding windows
原文传递
导出
摘要 As a special type of distributed denial of service(DDoS) attacks, the low-rate DDoS(LDDoS) attacks have characteristics of low average rate and strong concealment, thus, it is hard to detect such attacks by traditional approaches. Through signal analysis, a new identification approach based on wavelet decomposition and sliding detecting window is proposed. Wavelet decomposition extracted from the traffic are used for multifractal analysis of traffic over different time scale. The sliding window from flow control technology is designed to identify the normal and abnormal traffic in real-time. Experiment results show that the proposed approach has advantages on detection accuracy and timeliness. As a special type of distributed denial of service(DDoS) attacks, the low-rate DDoS(LDDoS) attacks have characteristics of low average rate and strong concealment, thus, it is hard to detect such attacks by traditional approaches. Through signal analysis, a new identification approach based on wavelet decomposition and sliding detecting window is proposed. Wavelet decomposition extracted from the traffic are used for multifractal analysis of traffic over different time scale. The sliding window from flow control technology is designed to identify the normal and abnormal traffic in real-time. Experiment results show that the proposed approach has advantages on detection accuracy and timeliness.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2020年第1期51-61,共11页 中国邮电高校学报(英文版)
基金 supported by the Joint Funds of National Natural Science Foundation of China and Civil Aviation Administration of China (U1933108) the National Science Foundation for Young Scientists of China (61601467) the Key Program of Natural Science Foundation of Tianjin (17JCZDJC30900) the Fundamental Research Funds for the Central Universities of China (3122019051).
关键词 low-rate distributed DENIAL of SERVICE ATTACKS WAVELET analysis SLIDING windows detection low-rate distributed denial of service attacks wavelet analysis sliding windows detection
  • 相关文献

参考文献4

二级参考文献51

  • 1卢锡城,张明杰,朱培栋.自适应PI主动队列管理算法[J].软件学报,2005,16(5):903-910. 被引量:19
  • 2纪其进,董永强.一种链路负载自适应的主动队列管理算法[J].软件学报,2006,17(5):1140-1148. 被引量:7
  • 3杨吉文,顾诞英,张卫东.主动队列管理中PID控制器的解析设计方法[J].软件学报,2006,17(9):1989-1995. 被引量:6
  • 4Kuzmanovic A, Knightly EW. Low-Rate TCP-targeted denial of service attacks--the shrew vs. the mice and elephants. In: Proc. of the ACM SIGCOMM 2003. New York: ACM Press, 2003. 75-86. http://byte.csc.lsu.edu/-durresi/7502/reading/p75-kuzmanovic. pdf. 被引量:1
  • 5Sarat S, Terzis A. On the effect of router buffer sizes on low-rate denial of service attacks. In: Proc. of the 14th Int'l Conf. on Computer Communications and Networks (ICCCN 2005). New York: IEEE Press, 200S. 281-286. http://www.cs.jhu.edu/-sarat/ ICCCN05.pdf. 被引量:1
  • 6Kwok YK, Tripathi R, Chen Y, Hwang K. HAWK: Halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks. In: Proc. of the 3rd Int'l Conf. on Networking and Mobile Computing (ICCNMC 2005). New York: Springer-Verlag, 2005.423-432. http://gridsec.usc.edu/files/TR/HAWK-ICCNMC2005-CameraReady.pdf. 被引量:1
  • 7Sun H, Lui JCS, Yau DKY. Defending against low-rate TCP attacks: Dynamic detection and protection. In: Proc. of the 12th IEEE Int'l Conf. on Network Protocols (ICNP 2004). New York: IEEE Press, 2004. 196-205. http://www.cse.cuhk.edu.hk/-cslui/ PUBLICATION/icnp_lowrate.pdf. 被引量:1
  • 8Sun H, Lui JCS, Yau DKY. Distributed mechanism in detecting and defending against the low-rate TCP attack. Computer Networks, 2006,50(13):2312-2330. 被引量:1
  • 9Chen Y, Hwang K. Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Journal of Parallel and Distributed Computing, 2006,66(9): 1137-1151. 被引量:1
  • 10Guirguis M, Bestavros A, Matta I. Exploiting the transients of adaptation for RoQ attacks on Internet resources. In: Proc. of the 12th IEEE Int'l Conf. on Network Protocols (ICN-P 2004). New York: IEEE Press, 2004. 184-195. http://www.ieee-icnp.org/ 2004/papers/5-2.pdf. 被引量:1

共引文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部