期刊文献+

基于PCC时间序列的DDoS检测算法 被引量:7

Distribution Denial of Service Detection Algorithm Based on PCC Time Series Analysis
下载PDF
导出
摘要 现有的DDo S检测方法大多局限于数据包检测这一层面,不能完整描述DDo S攻击过程,从而影响检测效果。针对这一问题,提出一种基于PCC(packet and conversation considering with context)时间序列的检测算法,从数据包级和会话流级进行分析,能更加全面地描述DDo S攻击过程;同时考虑前后数据的关联性,融合上下文信息,采用支持向量机(SVM)分类器建立DDo S攻击检测模型;最后提出一种可信报警策略进一步消除噪声和误分类带来的影响。实验结果显示,该方法能够有效检测DDo S攻击,减小网络流量噪声对检测结果的影响。 Most detecting algorithms which were confined to analyze packet could not describe DDo S completely. Without complete description,detection would be effected,thus could not provide effective information for network management. Concerning this issue,based on packet-and-conversation-considering-with-context( PCC) time series analysis,a novel approach was proposed to detect DDo S attacks. By analyzing packet and conversation of DDo S traffic simultaneously,and combined with context information,multi-dimensional characteristics can describe DDo S better. And then support vector machine( SVM) classifier was adopted to establish the DDo S attack detection model from packet feature vector and conversation feature vector. Furthermore,a reliable alarm strategy was proposed to further reduce the influence of noise. The experiment results showed that PCC based approach can detect DDo S attacks effectively and reduce the influence of traffic noise.
出处 《四川大学学报(工程科学版)》 CSCD 北大核心 2015年第S2期142-148,共7页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(61272447)
关键词 分布式拒绝服务攻击 会话流 数据包 上下文信息 网络噪声 distributed denial of service conversation packet context information network noise
  • 相关文献

参考文献8

  • 1Rastegari, Samaneh,Saripan, M Iqbal,Rasid, Mohd Fadlee A.Detection of Denial of Service Attacks against Domain Name System Using Neural Networks[J]. International Journal of Computer Science Issues (IJCSI) . 2009 (1) 被引量:1
  • 2Lan Li,Gyungho Lee.DDoS Attack Detection and Wavelets[J]. Telecommunication Systems . 2005 (3) 被引量:1
  • 3Jelena Mirkovic,Peter Reiher.A taxonomy of DDoS attack and DDoS defense mechanisms[J]. ACM SIGCOMM Computer Communication Review . 2004 (2) 被引量:1
  • 4NYCHIS G,SEKAR V,ANDERSEN D G,et al.An empirical evalua-tion of entropy-based traffic anomaly detection. IMC . 2008 被引量:1
  • 5Yu, Shui,Zhou, Wanlei,Doss, Robin.Information theory based detection against network behavior mimicking DDoS attacks. IEEE Communications Letters . 2008 被引量:1
  • 6Wang Zhongmin,Wang Xinsheng.DDo S attack detection algorithm based on the correlation of IP address analysis. Proceedings of the 2011 International Conference on Electrical and Control Engineering . 2011 被引量:1
  • 7Kim S S,Reddy A L N.Detecting tranffic anomalies at the source though aggregate analysis of packet header data. http://www.ece.tamu.edu/ . 2013 被引量:1
  • 8Lincoln Laboratory.DARPA data. http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ideval/data/index.html . 2000 被引量:1

同被引文献70

引证文献7

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部