期刊文献+

时变环境下的DoS网络攻击频谱检测方法仿真 被引量:2

Spectrum Sensing Method for Do S Network Attack under Time-Varying Environment
下载PDF
导出
摘要 时变Do S攻击是当前新出现的一种攻击形式,与非时变网络攻击不同,时变环境下的Do S网络攻击特征频谱处在大幅动态变化中,会造成用于检测攻击频谱处在不可控区间的波动中,无法形成区域内稳定的网络攻击频谱特征。传统的Do S攻击频谱检测方法,多是以检测非时变攻击频率特征为主,对时变攻击无法获取稳定的攻击频谱数据特征,检测的准确性一直较低。提出一种采用包络延拓和本征波匹配的时变Do S攻击频谱检测方法,通过时变Do S攻击频谱信号边界波与内部波之间的本征波匹配性对信号边界进行处理,采用AR模型完成所有时变Do S攻击频谱信号极值点之间上下包络的估测以及延伸,实现Do S攻击频谱的估测,通过时变Do S攻击前后随机序列统计均值的变化对估测到的Do S频谱进行检测。仿真结果表明,采用所提方法对时变Do S攻击频谱进行检测不仅检测率高,而且耗能低。 Time - varying DoS attack is the newly emerging attack mode. Unlike time - invariant network attack, the feature spectrum of DoS network attack under time - varying environment in sharply dynamic change, will cause that the detected attack spectrum is in the position of fluctuations in the uncontrolled range ,which is not able to form stable features of network attack spectrum in the region. A spectrum sensing method for time - varying DoS attack based on envelope continuation and eigen wave matching was proposed. The eigen wave matching feature between boundary wave and internal wave of time - varying DoS attack spectrum signal was used to make processing for the boundary of signal. The AR model was applied to complete the estimation and extension for the upper and lower enve- lopes between the extreme value points of all time - varying DoS attack spectrum signals, so as to achieve the estima- tion of DoS attack spectrum. According to the statistical average changes of the random sequences before and after the time - varying DoS attack, the estimated DoS spectrum can be detected. The simulation results show that the detection rate is high, and the consumption is low.
作者 王娟 付媛媛
出处 《计算机仿真》 CSCD 北大核心 2014年第12期300-303,共4页 Computer Simulation
关键词 包络延拓 本征波匹配 时变攻击 频谱检测 Envelope continuation Eigen wave matching Time -varying attack Spectrum sensing
  • 相关文献

参考文献5

二级参考文献51

  • 1刘慧婷,张旻,程家兴.基于多项式拟合算法的EMD端点问题的处理[J].计算机工程与应用,2004,40(16):84-86. 被引量:120
  • 2田慧蓉,邹仕洪,王文东,程时端.激励一致的自适应P2P拓扑构造[J].软件学报,2006,17(4):845-853. 被引量:13
  • 3舒忠平,杨智春.抑制经验模分解边缘效应的极值点对称延拓法[J].西北工业大学学报,2006,24(5):639-643. 被引量:34
  • 4马新新,赵洋,秦志光.Improving Resilience against DDoS Attack in Unstructured P2P Networks[J].Journal of Electronic Science and Technology of China,2007,5(1):18-22. 被引量:6
  • 5SkoudisEd.反击黑客[M].北京:机械工业出版社,2002..
  • 6LIANG J,NAOUMOV N, ROSS K W. The index poisoning attack in P2P file sharing systems[ C]//Proc of the 25th IEEE International Conference on Computer Communications. Barcelona : [ s. n. ] , 2006 : 1-12.
  • 7MARCO D. Ant colony optimization and swarm intelligence [ M ]. Brussels : Springer,2006 : 100-109.
  • 8ELKE M, ARNO P, GERTI K. Using taxonomies for content-based routing with ants [ J ]. Journal of Computer Networks, 2007,51 (16) : 4514-4528.
  • 9KAMVAR S D, SCHLOSSER M T,GARCIA M H. The eigentrust algorithm for reputation management in P2P networks[ C ]//Proc of the 12th International Conference on World Wide Web. New York: ACM Press, 2003 : 640- 651.
  • 10HUANG N E, ZHEN SHEN, LONG S R, et al. The Empirical Mode Decomposition and the Hilbert Spectrum for Nonlinear and Non-Stationary Time Series Analysis [ C ] //Proceedings of the Royal Society A : Mathematical, Physical and Engineering Sciences. London: [s. n. ], 1998: 903-995.

共引文献98

同被引文献15

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部