期刊文献+

基于请求关键词的应用层DDoS攻击检测方法 被引量:2

Application-layer DDoS Attack Detection Based on Request Key words
下载PDF
导出
摘要 目前应用层DDoS攻击严重危害互联网的安全。现有的检测方法只针对某种特定的应用层DDoS攻击,而不能识别应用层上其它的DDoS攻击。为了能快速有效地识别出多种应用层DDoS攻击,提出一种基于请求关键词的应用层DDoS攻击检测方法,该方法以单位时间内请求关键词的频率分布差和个数作为输入,采用隐马尔可夫模型来检测应用层DDoS攻击。实验结果表明,该方法对应用层上的多种DDoS攻击都具有很高的检测率和较低的误报率。 Today, the application-layer DDoS attacks may cause great harm to the security of the Internet. Existing de- tection methods lack the versatility, i. e., an approach only focuses on one particular application-layer DDoS attack. In order to quickly and effectively identify several different application-layer DDoS attacks, this paper presented a detection method based on request keywords. In this method, the input is the number and frequency distribution distance of re- quest keywords per unit time. Then, the hidden markov model is used to detect application-layer DDoS attacks. The ex- perimental results show that the proposed method is valid to discover several different application-layer DDoS attacks with relatively high detection ratio and low false positive ratio.
出处 《计算机科学》 CSCD 北大核心 2013年第7期121-125,共5页 Computer Science
基金 国家自然科学基金项目(61202271 61070154) 广东省自然科学基金项目(S2012040007184) 教育部人文社会科学研究青年基金项目(12YJCZH281) 广州市哲学社会科学规划项目(2012GJ31)资助
关键词 DDOS攻击 请求关键词 隐马尔可夫模型 应用层 DDoS attack, Request keyword, Hidden markov model, Application-layer
  • 相关文献

参考文献15

二级参考文献129

共引文献91

同被引文献40

  • 1谢逸,余顺争.基于Web用户浏览行为的统计异常检测[J].软件学报,2007,18(4):967-977. 被引量:42
  • 2孙知信,李清东.基于源目的IP地址对数据库的防范DDos攻击策略[J].软件学报,2007,18(10):2613-2623. 被引量:21
  • 3Ranjan S, Swaminathan R, Uysal M, et al. DIikshield: DI)oS- resilient scheduling to counter application layer attacks [J]. IEEE/ ACMTransactions on Networking, 2009, 17 (1): 26-39. 被引量:1
  • 4Xie Y, Yu S Z. A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors [J]. IEEE/ ACM Transactions on Networking, 2009, 17 (1): 54-65. 被引量:1
  • 5Yu J, Li Z, Chen H, et al. A detection and offense mecha- nism to defend against application layer DDoS attacks [C] //Third International Conference on Networking and Services. IEEE, 2007: 54-54. 被引量:1
  • 6CHEN Y, KU W-S, SAKAI K, et al. A novel DDoS attack defending framework with minimized bilateral damages [C] // Proceedings of the 7th IEEE Conference on Consumer Commu- nications and Networking Conference. Piscataway: IEEE, 2010: 1-5. 被引量:1
  • 7A1-Hammadi Y, Aickelin U, Greensmith J. DCA for bot de- tection [C] //IEEE Congress on Evolutionary Computation, 2008: 1807-1816. 被引量:1
  • 8Greensmith J. The dendritic cell algorithm [D]. Notting- ham: School of Computer Science, University of Notting- ham, 2007. 被引量:1
  • 9Greensrnith J, Aickelin U. Dendritic cells for SYN scan detec- tion [C] //Proceedings of the Genetic and Evolutionary Com- putation Conference, 2007: 49-56. 被引量:1
  • 10Twycross J. Integrated innate and adaptive artificial immune systems applied to process anomaly detection [D]. Notting- ham: University of Nottingham, 2007. 被引量:1

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部