全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

利用边际谱Hurst参数检测DDoS攻击

DOI: 10.13190/jbupt.201105.128.zhengkf, PP. 128-132

Keywords: DDoS检测,希尔伯特-黄变换,边际谱,Hurst参数

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了有效检测分布式拒绝服务(DDoS)攻击,提出对网络流量信号进行希尔伯〖JP9〗特-〖JP〗黄变换(HHT),得到相应的边际谱,计算边际谱的Hurst参数.以最大化综合指数为目标,训练实验数据的边际谱Hurst取值,得到检测阈值,通过与该阈值的大小进行比较判断是否有DDoS攻击发生.实验结果表明该方法具有一定的检测效果.

References

[1]  Li Muhai, Li Ming. An adaptive approach for defending against DDoS attacks[J]. Mathematical Problems in Engineering, 2010, Article ID 570940, doi: 10.1155/2010/570940.
[2]  何慧, 张宏莉, 张伟哲, 等. 一种基于相似度的 DDoS 攻击检测方法[J]. 通信学报, 2004, 25(7): 176-184. He Hui, Zhang Hongli, Zhang Weizhe, et al. A DDoS intrusion detection method based on likeness [J]. Journal of China Institute of Communications, 2004, 25(7) : 176-184.
[3]  Xiang Y, Lin Y, Lei W L, et al. Detecting DDOS attack based on network self-similarity [J]. IEE Proceedings Communications, 2004: 292-295.
[4]  Xia Zhengmin, Lu Songnian, Tang Junhua. Note on studying change point of LRD traffic based on Li’s detection of DDoS flood attacking[J]. Mathematical Problems in Engineering, 2010, Article ID 962435, doi: 10.1155/2010/962435.
[5]  王欣, 方滨兴. Hurst参数变化在网络流量异常检测中的应用[J]. 哈尔滨工业大学学报, 2005, 37(9): 1046-1049. Wang Xin, Fang Binxing. An exploratory development on the Hurst parameter variety of network traffic abnormity signal [J]. Journal of Harbin Institute of Technology, 2005, 37(9): 1046-1049.
[6]  雷剑刚, 吴洲. 网络性能测量技术的研究[J]. 福建电脑, 2006, 5: 59-60. Lei Jiangang, Wu Zhou. Research on measuring technology of network performance[J]. Fujian Computer, 2006, 5: 59-60.
[7]  于德介, 程军圣, 杨宇. 机械故障诊断的Hilbert-Huang变换方法[M]. 北京: 科学出版社, 2006: 24-46.
[8]  史美林, 钱俊, 许超. 入侵检测系统数据集评测研究[J]. 计算机科学, 2006, 33(8): 1-8. Shi Meilin, Qian Jun, Xu Chao. Research of intrusion detection system dataset evaluation[J]. Computer Science, 2006, 33( 8): 1-8.
[9]  Li M, Jiang X. DDoS attacks detection model and its application [J]. WSEAS Transactions on Computers, 2008, 7(8): 1159-1168.
[10]  Li Muhai, Li Ming. A new approach for detecting DDoS attacks based on wavelet analysis//Proceedings of the 2nd International Congress on Image and Signal Processing (CISP ’09). 2009.
[11]  Yang Minghui, Wang Ruchuan. DDoS detection based on wavelet kernel support vector machine [J]. The Journal of China Universities of Posts and Telecommunications, 2008, 15(3): 59-63.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133