期刊文献+

基于Hadoop架构的混合型DDoS攻击分布式检测系统 被引量:5

Hybrid DDoS Attack Distributed Detection System Based on Hadoop Architecture
下载PDF
导出
摘要 混合型DDoS攻击采取多种数据类型相结合的方式,具有穿透力强、难以被精确检测的特点,逐步取代了单一类型的DDoS攻击。文章针对混合型DDoS攻击的检测,设计了基于Hadoop集群的分布式入侵检测架构,并提出了一种利用MapReduce模型的多属性融合检测算法。该算法对传统的仅从IP单一角度进行检测的算法进行改进,能够融合IP、数据帧长度、标志位等多重属性并通过自适应调整阈值实现入侵流量检测。实验结果表明,该系统具有良好的扩展性,通过扩展集群规模与调大HDFS分块可获得更优的检测性能。与传统检测算法相比,在检测时间未明显增加的情况下,该系统可显著提高混合型DDoS攻击的检测率,同时能够确定具体攻击类型。 Hybrid DDoS attack adopts the attack mode combining multiple data types,and gradually replaces the single type of DDoS attack because of its strong penetrating power and difficult to be accurately detected.For the detection of hybrid DDoS attacks,a distributed intrusion detection architecture based on Hadoop cluster is designed,and a multi-attribute fusion detection algorithm using MapReduce model is proposed.This algorithm improves the traditional algorithm which only detects from IP single angle,and can realize intrusion traffic detection by integrating IP,data frame length,flag bit and other multiple attributes and adaptive adjustment threshold.The experimental results show that the distributed intrusion detection system designed in this paper has good scalability,and better detection performance can be achieved by expanding the cluster scale and increasing the HDFS block size.Compared with the traditional detection algorithm,the detection rate of hybrid DDoS attack is significantly improved without significant increase in detection time,and the specific attack type can be determined.
作者 罗文华 程家兴 LUO Wenhua;CHENG Jiaxing(College of Public Security Information Technology and Information,Criminal Investigation Police University of China,Shenyang 110035,China)
出处 《信息网络安全》 CSCD 北大核心 2021年第2期61-69,共9页 Netinfo Security
基金 国家重点研发计划[2018YFC0830600] 公安部技术研究计划[2017JSYJA10]。
关键词 混合型DDoS攻击 HADOOP MAPREDUCE 阈值 标志位 hybrid DDoS attack Hadoop MapReduce threshold flag bit
  • 相关文献

参考文献10

二级参考文献61

  • 1沈辉,张龙.基于WinPcap的网络数据监测及分析[J].计算机科学,2012,39(S2):15-18. 被引量:18
  • 2潘全,郭鸣,林鹏.基于MapReduce的最大团算法[J].系统工程理论与实践,2011,31(S2):150-153. 被引量:5
  • 3王佰玲,方滨兴,云晓春.零拷贝报文捕获平台的研究与实现[J].计算机学报,2005,28(1):46-52. 被引量:67
  • 4孙知信,姜举良,焦琳.DDOS攻击检测和防御模型[J].软件学报,2007,18(9):2245-2258. 被引量:34
  • 5CHA B R,VAIDYA B,HAN S.Anomaly intrusion detection forsystem call using the Soundex algorithm and neural networks[].Proc of the th IEEE Symposiumon Computers and Communications.2005
  • 6YASIN MM,AWAS A A.A study of host-based IDS using systemcalls[].Proc of International Conference of Networking and Com-munication.2004
  • 7LI Zhuo-wei,DAS A.Visualizing and identifying intrusion contextfrom system calls trace[].Proc of the th Annual Computer Secu-rity Applications Conference.2004
  • 8Computer Science Department.Computer immune systems. http://www.cs.unm.edu/~immsec/data-sets.htm .
  • 9WARRENDER C,FORRESR S,PEARLMUTTER B.Detecting in-trusions using system calls:alternative data models[].Proc ofIEEE Symposium on Security and Privacy.1999
  • 10HENGARTNER U,STEENKISTE P.Exploiting information relation-ships for access control[].Proc of the rd IEEE International Con-ference on Pervasive Computing and Communications.2005

共引文献83

同被引文献27

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部