期刊文献+

基于知识图谱的DDoS攻击源检测研究 被引量:8

DDoS Attack Detection Based on Knowledge Graph
在线阅读 下载PDF
导出
摘要 分布式拒绝服务(DDoS)是黑客常用的网络攻击之一.提出了一种基于知识图谱的DDoS攻击检测方法,针对TCP流量的DDoS攻击,使用知识图谱的形式表述2个主机之间TCP流量的通信过程,在此基础上进行DDoS攻击检测,判断该源主机是否是DDoS攻击的发起者.使用加州大学洛杉矶分校数据集(UCLA CSD packet traces)进行实验,实验表明,提出的检测方法能够有效检测出发起DDoS的攻击源. Distributed denial of service(DDoS)is one of the most common network attacks by hackers.In this paper,a DDoS attack detection method based on knowledge graph is proposed,which is mainly aimed at the DDoS attack of TCP traffic.Knowledge graph is used to express the communication process of TCP traffic between two hosts,DDoS attack detection is carried out to determine whether the source host is the initiator of DDoS attack base on that.Experiments with UCLA CSD Packet Traces have shown that the proposed approach can effectively detect the source of DDoS attacks.
作者 陈佳 Chen Jia(College of Cybersecurity,Sichuan University,Chengdu 610065)
出处 《信息安全研究》 2020年第1期91-96,共6页 Journal of Information Security Research
关键词 DDOS攻击 知识图谱 入侵检测 TCP流量 源检测 DDoS attack knowledge map instrusion detection TCP traffic source detectio
  • 相关文献

参考文献6

二级参考文献54

  • 1冯昭志,黄载禄,杨叔子.单层神经网络的快速学习算法研究[J].自动化学报,1997,23(1):68-72. 被引量:4
  • 2孙知信,姜举良,焦琳.DDOS攻击检测和防御模型[J].软件学报,2007,18(9):2245-2258. 被引量:34
  • 3刘克彬,李芳,刘磊,韩颖.基于核函数中文关系自动抽取系统的实现[J].计算机研究与发展,2007,44(8):1406-1411. 被引量:61
  • 4Giralte L C, Conde C, Diego I M, et al. Detecting denial ofservice by modelling web-server behaviour[J]. Computers andElectrical Engineering, 2013’ 39(7): 2252-2262.
  • 5Devi S R,Yogesh P. A hybrid approach to counter applicationlayer DDOS attacks[J]. International Journal on Cryptographyand Information Security (IJCIS), 2012, 2(2): 45-52.
  • 6Jeyanthi N, Iyengar N C H. An entropy based approach to detectand distinguish DDoS attacks from flash crowds in VoIPnetworks[J]. International Journal of Network Security, 2012,14(5): 257-269.
  • 7Kumar P A, Selvakumar S. Distributed denial of service attackdetection using an ensemble of neural classifier[J]. ComputerCommunications, 2011, 34(11): 1328—1341.
  • 8Stevanovic D, Vlajic N, Aijun A. Detection of malicious andnon-malicious website visitors using unsupervised neuralnetwork learning[J], Applied Soft Computing, 2013, 13:698-708.
  • 9Chapelle O, Weston J, Sch6lkopf B. Cluster kernels forsemi-supervised leaming[J]. Advances in Neural InformationProcessing Systems, 2003, 15(5): 585-592.
  • 10Belkin M, Niyogi P, Sindhwani V. Manifold regularization: Ageometric framework for learning from labeled and unlabeledexamples[J]. Journal of Machine Learning Research, 2006, 7:2399-2434.

共引文献1211

同被引文献64

引证文献8

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部