期刊文献+

基于粗糙集算法的DDoS攻击威胁评估

Threat Assessment of DDoS Attacks based on Rough Set Algorithm
下载PDF
导出
摘要 DDoS攻击具有发起容易、防御难的特点,一直是网络安全防御的难点和热点之一。针对常见的洪水式DDoS攻击,提出基于粗糙集理论的安全评估方法,实现安全威胁的实时定量评估。该方法通过测量攻击发起前后相关的网络和系统指标变化,确定用于衡量DDoS攻击影响的一系列指标。然后,进一步利用粗糙集算法分析DDoS安全威胁程度的样本决策表,计算属性重要性并进行归一化处理,得出各指标的权重。最后,对约简后的指标进行加权求和,得到安全态势值。实验证明,该方法能够有效地量化攻击发生前后的系统安全状态变化。与现有的安全评估方法相比,利用粗糙集理论的安全评估方法可以在不依赖先验知识的前提下确定指标权重,客观地对DDoS攻击做出评估和预测。 DDoS attack, with easy launch and hard defence, is always a matter of concern in network security. Aiming at common in-flood DDoS attacks(cc attack), the security assessment method based on rough set algorithms is proposed, thus to achieve real-time quantitative assessment of security threats. By measuring changes in related indices of network and system performance before and after attack, a series of indices for evaluating DDoS attacks, are determined, then further with rough set algorithm the sample decision table of DDoS attacks, is analyzed, the normalized importance of each index calculated,and the weight of each index acguired. Finally the security situation value is obtained by weighted summation of the chosen indices. Experiments show that this method can effectively quantify the changes of system security state before and after attack. Compared with the existing security assessment methods, the security evaluation method based on rough set theory can determine the weight of indices without any reliance on prior knowledge, and objectively evaluate and predict the DDoS attack.
作者 宋全振 陈秀真 马进 SONG Quan-zhen CHEN Xiu-zhen MA Jin(School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200240, Chin)
出处 《通信技术》 2017年第1期109-115,共7页 Communications Technology
基金 国家自然科学基金(No.61562004 No.61431008) 上海市科委自然基金(面上) 基础研究重点项目(No.13JC1403501) 上海市信息化发展专项(201601074)~~
关键词 DDOS 安全评估 粗糙集算法 态势感知 DDoS security evaluation rough set algorithm situation awareness
  • 相关文献

参考文献3

二级参考文献21

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2Porras P A, Fong M W, Valdes A. A mission-impactbased approach to INFOSEC alarm correlation [ C ]// The Fifth International Symposium on Recent Advances in Intrusion Detection. Zurich, Switzerland, 2002 : 95 - 114.
  • 3Si Jiaquan, Wang Kaizhuo, Wang Wei, et al. Study of index weight in network threat evaluation based on improved grey theory [ C ]//IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application. Wuhan,China,2008 : 9 - 13.
  • 4Lippmann Richard, Webster Seth, Stetson Douglas. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection[C]//The Fifth International Symposium on Recent Advances in Intrusion Detection. Zurich, Switzerland, 2002 : 307 - 326.
  • 5Manganaris Stefanos, Christensen Marvin, Zerkle Dan, et al. A data mining analysis of RTID alarms[J].Computer Networks, 2000,34 ( 4 ) : 571 - 577.
  • 6Martin Roesch, Chris Green. Snort users manual 2. 0. 0 [ EB/OL ]. ( 2004-08-02 ) [ 2005-02-01 ]. http ://www. snort, org/docs/snort_manual.
  • 7Taylor Carol, Alves-Foss Jim. An empirical analysis of NATE--network analysis of anomalous traffic events [ C]//The Tenth New Security Paradigms Workshop, Virginia Beach, USA, 2002 : 18 - 26.
  • 8Ortalo Rodolphe, Deswarte Yves, Kaaniche Mohamed. Experimenting with quantitative evaluation tools for monitoring operational security[J]. IEEE Transactions on Software Engineering, 1999,25 ( 5 ) : 633 - 651.
  • 9陈秀真,李建华.基于OVAL的新型漏洞评估系统[J].小型微型计算机系统,2007,28(9):1554-1557. 被引量:8
  • 10BASS T,GRUBER D.A glimpse into the future of id[EB/OL].(1999-11-16)[2007-04-20].http://www.usenix.org/publications/login/1999-9/features/future.html.

共引文献371

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部