期刊文献+

基于人类访问模型的应用层DDoS攻击检测研究 被引量:1

The Research of Application Layer DDoS Attack Detection based the Model of Human Access
下载PDF
导出
摘要 随着计算机网络的应用和普及,人们对网络安全的要求也愈发强烈。在网络安全领域中,DDoS被认为是最具有破坏力的网络攻击之一,它的破坏力随着网络带宽的增加而增大。针对于传统的网络层DDoS攻击检测和预防手段已趋向成熟,攻击者则向更高层次——应用层DDoS攻击转移。应用了无监督学习方法对应用层DDoS攻击进行检测,并对具体的网络场景进行数字仿真,通过对仿真结果的分析,判断出被攻击的网络区域。通过对不同类型访问者在网络中神经元分布情况的分析,着重指出攻击者与正常访问用户的访问行为间的区别,为日后进一步对应用层DDoS有效检测和防范提供理论基础。 With the application and popularization of the compu%er network, people have increasingly intense for network security requires.In the field of network security, DDoS attacks are considered one of the most destructive of the network attack, the destructive is more powerful with increasing of the network bandwidth. For the traditional network layer DDoS attack detection and prevention tools are maturing, the attacker then to a higher level - application-layer DDoS attacks. In this paper, a method for unsupervised learning to detect application-layer DDoS attacks, and specific network scenarios for digital simulation, through the analysis of simulation results, determine the areas of the network being attacked. Through the analysis of different types of visitors in the distribution networks of neurons, highlighting the difference between the attacker access and the user's access behavior. Through these provides a theoretical for the DDoS application layer detection and prevention in the future.
出处 《计算机安全》 2014年第6期11-14,共4页 Network & Computer Security
关键词 无监督学习 DDOS 神经网络 MAL LAB 访问行为特征 unsupervised learning DDoS neural networks matlab access behavioral characteristics
  • 相关文献

参考文献4

二级参考文献20

  • 1张铭钧,孙瑞琛,王玉甲.基于RBF神经网络的水下机器人传感器状态监测方法研究[J].哈尔滨工程大学学报,2005,26(6):726-731. 被引量:10
  • 2Healey A J ,Marco D B.A neural network approach to failure diagnostics for underwater vehicles [C]. Proceedings of IEREE Oceanic Engineering SocieW Symposium on Autonomous Underwater Vehicles, AUV- 92,1992:131-135.
  • 3Edin O, Geoff R. Fault diagnosis and accommodation for ROVs [C]. Sixth IFAC conference on manoeuvring and control marine craft, 2003:575-588.
  • 4Edin O, Geoff R. Thruster fault diagnosis and accommodation for open-frame underwater vehicles [ C ]. Control Engineering Practice, 2004 (12):1575-1598.
  • 5Ismail Ari,Bo Hong,Ethan L,et al.Modeling,analysis and simulation of flash crowds on the Internet.Technical Report UCSC-CRL-03-15.Storage Systems Research Center,Jack Baskin School of Engineering University of California,Santa Cruz,CA,Feb 2004
  • 6JungJ,Krishnamurthy B,Rabinovich M.Flash crowds and denial of service attacks:characterization and implications for CDNs and Web sites.In:Proceeding of the 11th IEEE Intemational World Wide Web Conference,Honolulu,Hawaii,May 2002
  • 7Michael Walfish,Mythili Vutukuru,Hari Balakrishnan,et al.DDoS defense by offense.In:Proceedings of SIGCOMM'06,Pisa,Italy,Sept 2006
  • 8Jin Cao,Cleveland W S,Yuan Gao,et al.Stochastic models for generating synthetic HTTP source traffic.In:Proceedings of IEEE INFOCOM,Hong Kong,China,March 2004
  • 9Lee Breslau,Pei Cao,Li Fan,et al.Web caching and Zipf-like distributions:evidence and implications.In:Proceeding of the IEEE INFOCOM'99,Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies,New York,NY,USA,March 1999
  • 10Christos Douligeris,Aikaterini Mitrokotsa.DDoS attacks and defense mechanisms:classification and state-of-the-art.Computer Networks,2004,44(5):643~666

共引文献22

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部