期刊文献+

基于深度学习的复杂网络实时Sybil攻击检测算法 被引量:2

REAL-TIME SYBIL ATTACK DETECTION ALGORITHM FOR COMPLEX NETWORKS BASED ON DEEP LEARNING
下载PDF
导出
摘要 针对复杂网络中Sybil攻击检测速度较慢的问题,提出一种基于深度学习的复杂网络实时Sybil攻击检测方案。从网络中采集数据,提取合适的特征;通过深度学习技术预测网络中的攻击行为。基于多层核极限学习机的深度学习技术包括无监督表示学习与监督特征分类两个阶段。通过低秩逼近法计算近似的经验核映射,代替原极限学习机随机生成的隐层。将经验核映射-自动编码的栈式自编码器作为表示学习,对极限学习机的时间效率与存储成本实现了显著的提高。基于实际社交数据的实验结果表明,该方案有效地降低了Sybil攻击的检测时间,并且保持了较好的检测效果。 Aiming at the problem of low speed of Sybil attacks detection in the complex networks,this paper proposed a real-time Sybil attack detection for complex networks based on deep learning. Firstly,the data was collected from the network,and the appropriate features were extracted. Then deep learning technique was used to predict the attack behaviors of networks. In this paper,deep learning technique based on multilayer kernel extreme learning machine consisted of unsupervised representation learning and supervised features classification. An approximate empirical kernel was computed through low rank approximation method in replace of the randomly generated hidden layer of original extreme learning machine. The stacked auto encoders of empirical kernel were used for representation learning,so that the time efficiency and the storage cost of extreme learning machine were both improved observably. Experimental results based on the real social data indicate that the proposed scheme reduces the detection time of Sybil attacks effectively,and it realizes good detection results too.
作者 李扬 王春明 Li Yang;Wang Chunming(School of Electronics and Information,Jiangsu Vocational College of Business,Nantong 226011,Jiangsu,China;School of Computer Science and Technology,Nantong University,Nantong 226019,Jiangsu,China)
出处 《计算机应用与软件》 北大核心 2019年第7期300-306,共7页 Computer Applications and Software
基金 江苏高校‘青蓝工程’项目(201706-202006) 江苏省“333工程”科研项目(BRA2018220) 江苏省教育科学“十三五”规划专项课题(C-c/2016/03/01) 南通市科技计划项目(GY12015037) 南通市港闸区科技项目(GZKJ2018JHK008)
关键词 表示学习 深度学习 极限学习机 社交网络 网络安全 深度神经网络 Representation learning Deep learning Extreme learning machine Social network Network security Deep neural network
  • 相关文献

参考文献3

二级参考文献20

  • 1孙吉贵,刘杰,赵连宇.聚类算法研究[J].软件学报,2008(1):48-61. 被引量:1065
  • 2Douceur J. The Sybil attack [M]//Lecture Notes in Computer Scie- nce 2429,2002 : 251-260.
  • 3Yu H, Kaminsky M, Gibbons P B, et al. SybilGuard.. Defending Against Sybil Attacks via Social Networks[J]. IEEE/ACM Transactions on Networking, 2008,16 (3) .. 576-589.
  • 4Yu H, Gibbons P B, Kaminsky M, et al. Sybillimit: A near-opti- mal social network defense against sybil attacks [C]//IEEE Symposium on Security and Privacy. Oakland, 2008:3-17.
  • 5Tran N, Li J, Subramanian L, et al. Optimal sybil-resilient node admission control[C]//IEEE INFOCOM. Shanghai, 2011:3218- 3226.
  • 6Danezis G, Mit P. Sybilinfer: Detecting sybil nodes using social networks[C]//NDSS. 2009.
  • 7Xu L, Chainan S, Takizawa H, et al. Resisting Sybil attack by social network and network elustering[C]//10th Annual Inter- national Symposium on Applications and the Internet. Seoul, 2010:15-21.
  • 8Wei W, Xu F, Tan C C, et al. Sybil Defender: Defend Against Sybil Attacks in Large Social Networks[C]//IEEE INFOCOM. 2012:1951-1959.
  • 9Golder S, Lotan (Jr. Tweet, tweet, retweet: Conversatfonal as- pects of retweeting on Twitter[C]//2010 43rd Hawaii Interma- tional Conference on System Sicences(HlCSS). 2010:1-10.
  • 10Honeycutt C, Herring S C. Beyond microblogging: Conversation and collaboration via Twitter[C]//42nd Hawaii International Conference on System Sciences, 2009 ( HICSS' 09). IEEE, 2009 : 1-10.

共引文献7

同被引文献22

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部