期刊文献+

基于聚类的应用层DDoS攻击检测方法 被引量:1

DDoS Attack Detection Method on Application Layer Based on Clustering
下载PDF
导出
摘要 提出了一种基于聚类的应用层DDoS攻击检测方法,该方法首先采集Web服务器端网络流量,经过数据预处理后从中选取4个属性组成流量特征向量,后利用粒子群算法优化的K-Means聚类算法建立检测模型,并通过该模型识别攻击行为。实验结果表明,该方法与K-Means算法建立的检测方法相比,能有效地识别应用层DDoS攻击行为,且具有较高的检测率。 This paper proposes a clustering-based DDoS attack detection method for application layer.Firstly,the method collects web server network traffic,and selects four attributes to form the traffic feature vector after data preprocessing.Then,the K-means clustering algorithm optimized by particle swarm optimization is used to establish the detection model,and the attack behavior is identified through the model.Experimental results show that this method can effectively identify DDoS attacks in application layer and has higher detection rate compared with k-means algorithm.
作者 张志源 ZHANG Zhi-yuan(Jincheng Vocational and Technical College,Jincheng 048000,Shanxi)
出处 《电脑与电信》 2021年第7期25-28,共4页 Computer & Telecommunication
基金 晋城职业技术学院课题,项目编号:LX2013。
关键词 应用层 DDOS攻击 聚类 application layer DDoS attack clustering
  • 相关文献

参考文献3

二级参考文献18

  • 1AHN L V, BLUN M, HOPPER N J, et al. CAPTCHA: using hard AI problems for security[C]//Lecture Notes in Computer Science, vol 2656. [S.l.] :Springer-Verlag, 2003:646-653.
  • 2KANDULA S, KATABI D, JACOB M, et al. Botz-4-Sale: surviving organized DDoS attacks that mimic flash crowds[C]//Proc of the 2nd Symposium on Networked Systems Design and Implementation. 2005:287-300.
  • 3RANJAN S, SWAMINATHAN R, UYSAL M, et al. DDoS-resilient scheduling to counter application layer attacks under imperfect detection[C]//Proc of the 25th IEEE International Conference on Computer Communications. Barcelona:IEEE Press, 2006:1-13.
  • 4YATAGAI T, ISOHARA T, SASASE I. Detection of HTTP-GET flood attack based on analysis of page access behaviour[C]//Proc of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing. Victoria: IEEE Press, 2007:232-235.
  • 5WALFISH M, VUTUKURU M, BALAKRISHNAN H, et al. DDoS defense by offense[C]//Proc of Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York:ACM Press, 2006:303-314.
  • 6OIKONOMOU G, MIRKOVIC J. Modeling human behaviour for defense against flash-crowd attacks[C]//Proc of IEEE International Conference on Communications.Dresden: IEEE Press, 2009:1-6.
  • 7TracesavailableintheInternettrafficarchive[EB/OL].http://ita.ee.lbl.gov/html/traces.html.
  • 8HANJW KAMBRM.DataMiningConceptsandTechniques(影印本)[M].北京:高等教育出版社,2001.326-329.
  • 9WU YS, DING XQ. A new clustering method for Chinese character recognition system using artificial neural networks[J]. Chinese Journal of Electronics, 1993, 2(3):1-8.
  • 10MAULIK U, BANDYOPADHYAY S. Genetic Algorithm-based Clustering Technique[J]. Pattern Recognition, 2000, 33(9):1455-1465.

共引文献42

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部