期刊文献+

基于k-Means改进算法的分布式拒绝服务攻击检测 被引量:4

The Detection of Distributed Denial-of-Service Attacks Using the Improved k-Means Algorithm
下载PDF
导出
摘要 分布式拒绝服务(DDoS)攻击是当前主要的网络安全威胁之一。本文分析了DDoS攻击的本质特征,提出了结合流量及流特征分布熵的检测策略,并根据问题需要改进了k-means聚类算法,并用之建立攻击检测模型。最后,使用LLDOS1.0数据集对该模型进行测试。实验结果表明,该模型具有良好的检测精度,验证了检测策略的有效性。 Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. This paper analyses the essential characteristics of DDoS attacks, and presents a novel detection scheme by combining the traffic volume with traffic feature distribution entropy. Furthermore, we improve the k-means clustering algorithm, which is used to establish the attack detection model. Finally we test our detection model on the LLDOS1.0 dataset. The experimental results indicate that the model leads to an improved accuracy of attack detection.
出处 《计算机工程与科学》 CSCD 2008年第12期23-26,共4页 Computer Engineering & Science
基金 国家自然科学基金资助项目(60603062) 湖南省自然科学基金资助项目(06JJ3035)
关键词 分布式拒绝服务攻击 流特征分布熵 k—means聚类算法 DDoS attack traffic feature distribution entropy k-means clustering algorithm
  • 相关文献

参考文献2

二级参考文献27

  • 1孙钦东,张德运,孙朝晖,张晓.基于流连接密度的分布式拒绝服务攻击检测[J].西安交通大学学报,2004,38(10):1048-1052. 被引量:5
  • 2孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报,2005,28(5):767-773. 被引量:55
  • 3Haykin S. Adaptive Filter Theory. Third Edition. Upper Saddle River, New Jersey: Prentice-Hall, 1996
  • 4Vapnik V.N. The Nature of Statistical Learning Theory. NY: Springer-Verlag, 1995
  • 5Burges C.J.C. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 1998, 2(2): 121~167
  • 6Boser B.E., Guyon I.M., Vapnik V.N. A training algorithm for optimal margin classifiers. In: Proceedings of the 5th Annual ACM Workshop on COLT, Pittsburgh, 1992, 144~152
  • 7Osuna E., Freund R., Girosi F. Training support vector machines: An application to face detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, San Juan, Puerto, Rico, 1997, 130~136
  • 8Platt J.C. Sequetial minimal optimization: A fast algorithm for training support vector machines. Microsoft Research: Technical Report MST-TR-98-14, 1998
  • 9Criscuolo P.J. Distributed denial of service- trin00, tribe flood network, tribe flood network 2000, and stacheldraht. Lawrence Livermore National Laboratory, Livermore, CA: Technical Report CIAC-2319, 2000
  • 10Lau F., Rubin S.H., Smith M.H., Trajkovic L. Distributed denial of service attacks. In: Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Nashville, 2000, 2275~2280

共引文献104

同被引文献18

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部