期刊文献+

基于树突状细胞算法的应用层DDoS攻击检测 被引量:4

Application-layer DDoS attack detection based on dendritic cell algorithm
下载PDF
导出
摘要 通过分析应用层分布式拒绝服务(distributed denial of service,DDoS)攻击的原理及特征,比较网络安全与生物免疫系统的相似性,提出一种运用树突状细胞算法(dendritic cells algorithm,DCA)检测应用层DDoS攻击的方法。根据web服务器应用层DDoS攻击请求的生成方式,对一段时间内同一源IP的数据包等特征进行分析,根据正常及攻击行为在特征表现上的差异,判断是否存在攻击行为。实验结果表明,该方法能够有效检测出应用层的DDoS攻击,具有较高的检测率。 By analyzing the principles and characteristics of the application-layer DDoS(distributed denial of service)attack,comparing the similarity between network security and biological immune system,a method of dendritic cells algorithm(DCA)for application-layer DDoS attacks detection was proposed.According to the way that the application-layer DDoS of web server generates,packets and other features from the same source IP in a period of time were analyzed,and according to the difference of performance characteristic between normal and aggressive behaviors,whether an attack exists or not was determined.And the experimental results show that,this method can detect application-layer DDoS attacks effectively,and ensure a higher detection rate.
出处 《计算机工程与设计》 北大核心 2015年第4期841-845,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(61170306)
关键词 分布式拒绝服务攻击 应用层 树突状细胞算法 特征分析 攻击检测 DDoS application-layer dendritic cell algorithm feature analysis attack detection
  • 相关文献

参考文献17

  • 1张永铮,肖军,云晓春,王风宇.DDoS攻击检测和控制方法[J].软件学报,2012,23(8):2058-2072. 被引量:117
  • 2谢柏林,蒋盛益,张倩生.基于请求关键词的应用层DDoS攻击检测方法[J].计算机科学,2013,40(7):121-125. 被引量:2
  • 3王风宇,曹首峰,肖军,云晓春,龚斌.一种基于Web群体外联行为的应用层DDoS检测方法[J].软件学报,2013,24(6):1263-1273. 被引量:17
  • 4Ranjan S, Swaminathan R, Uysal M, et al. DIikshield: DI)oS- resilient scheduling to counter application layer attacks [J]. IEEE/ ACMTransactions on Networking, 2009, 17 (1): 26-39.
  • 5肖军,云晓春,张永铮.基于会话异常度模型的应用层分布式拒绝服务攻击过滤[J].计算机学报,2010,33(9):1713-1724. 被引量:21
  • 6Xie Y, Yu S Z. A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors [J]. IEEE/ ACM Transactions on Networking, 2009, 17 (1): 54-65.
  • 7Yu J, Li Z, Chen H, et al. A detection and offense mecha- nism to defend against application layer DDoS attacks [C] //Third International Conference on Networking and Services. IEEE, 2007: 54-54.
  • 8CHEN Y, KU W-S, SAKAI K, et al. A novel DDoS attack defending framework with minimized bilateral damages [C] // Proceedings of the 7th IEEE Conference on Consumer Commu- nications and Networking Conference. Piscataway: IEEE, 2010: 1-5.
  • 9A1-Hammadi Y, Aickelin U, Greensmith J. DCA for bot de- tection [C] //IEEE Congress on Evolutionary Computation, 2008: 1807-1816.
  • 10Greensmith J. The dendritic cell algorithm [D]. Notting- ham: School of Computer Science, University of Notting- ham, 2007.

二级参考文献83

共引文献170

同被引文献34

  • 1Symantec. 2014 Internet security threat report, 2014 [EB/OL]. http://www, symantec, com/security_response/publications/threatreport, jsp? om_ext_cid = biz_socmed_twitter_facebook_marketwire_linkedin_2013 Apr_worldwide_ISTR18.
  • 2Forrest S, Perelson A S, Allen L, et al. Self - Nonself discrimination in a computer [ C ]//The IEEE Symposium on Research in Security and Privacy. Oakland : IEEE, 1994 : 202 - 212.
  • 3Greensmith J, Aickelin U, Cayzer S. Introducing dendritic cells as a novel immune -inspired algorithm for anomaly detection [ C ]/! LNCS,ICARIS. Heidelberg: Springer, 2005, 3627 : 153 - 167.
  • 4LN De Castro, FJ Von Zuben. The clonal selection algorithm with engineering application [ C ]//Proceedings of GECCO Workshop on Artificial Immune Systems and Their Applications. Las Vegas: CiteSeer, 2000:36 -37.
  • 5Matzinger P. Tolerance, danger and the extended family [ J]. Annual Review of Immunology, 1994, 12:991 - 1045.
  • 6Aickelin U, Bentley P, Cayzer S, et al. Danger theory : the link between AIS and IDS? [ C ]//LNCS, ICARIS. Heidelberg: Springer, 2003, 2787 : 147 - 155.
  • 7Gu F, Greensmith J, Aickelin U. Further exploration of the dendritic cell algorithm: antigen multiplier and time windows [ C ]//LNCS, ICAR- IS. Heidelberg: Springer, 2008, 5132:142 - 153.
  • 8Greensmith J, Aickelin U. The deterministic dendritic cell algorithm [ C ]//LNCS, ICARIS. Heidelberg: Springer, 2008, 5132:291 -303.
  • 9FANG Xian -jin, WANG Li. Theoretical investigation on the dendritic cells algorithm [ J]. Journal of Beijing Institute of Technology. 2014, 23(3) : 401 -406.
  • 10Zhang FuYong, Qi DeYu, Hu 1ingLin. MBMAS: a system for malware behavior monitor and analysis [ C ]//2009 International Symposium on Computer Network and Multimedia Technology (CNMT), Wuhan, China, 2009.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部