期刊文献+
共找到1,308篇文章
< 1 2 66 >
每页显示 20 50 100
FRF-BiLSTM:Recognising and Mitigating DDoS Attacks through a Secure Decentralized Feature Optimized Federated Learning Approach
1
作者 Sushruta Mishra Sunil Kumar Mohapatra +2 位作者 Kshira Sagar Sahoo Anand Nayyar Tae-Kyung Kim 《Computers, Materials & Continua》 2026年第3期1118-1138,共21页
With an increase in internet-connected devices and a dependency on online services,the threat of Distributed Denial of Service(DDoS)attacks has become a significant concern in cybersecurity.The proposed system follows... With an increase in internet-connected devices and a dependency on online services,the threat of Distributed Denial of Service(DDoS)attacks has become a significant concern in cybersecurity.The proposed system follows a multi-step process,beginning with the collection of datasets from different edge devices and network nodes.To verify its effectiveness,experiments were conducted using the CICDoS2017,NSL-KDD,and CICIDS benchmark datasets alongside other existing models.Recursive feature elimination(RFE)with random forest is used to select features from the CICDDoS2019 dataset,on which a BiLSTM model is trained on local nodes.Local models are trained until convergence or stability criteria are met while simultaneously sharing the updates globally for collaborative learning.A centralised server evaluates real-time traffic using the global BiLSTM model,which triggers alerts for potential DDoS attacks.Furthermore,blockchain technology is employed to secure model updates and to provide an immutable audit trail,thereby ensuring trust and accountability among network nodes.This research introduces a novel decentralized method called Federated Random Forest Bidirectional Long Short-Term Memory(FRF-BiLSTM)for detecting DDoS attacks,utilizing the advanced Bidirectional Long Short-Term Memory Networks(BiLSTMs)to analyze sequences in both forward and backward directions.The outcome shows the proposed model achieves a mean accuracy of 97.1%with an average training delay of 88.7 s and testing delay of 21.4 s.The model demonstrates scalability and the best detection performance in large-scale attack scenarios. 展开更多
关键词 Bi-directional long short-term memory network distributed denial of service(ddos) CYBERSECURITY federated learning random forest
在线阅读 下载PDF
基于改进LSTM算法的无线网络DDoS攻击防御方法
2
作者 徐伟 冷静 《现代电子技术》 北大核心 2026年第8期61-64,70,共5页
为有效防御无线网络中的DDoS攻击,保证网络服务的连续性与稳定性及安全通信,提出一种基于改进LSTM算法的无线网络DDoS攻击防御方法。该方法分析无线网络中DDoS攻击的模式特点和影响,确定网络在攻击下的流量变化规律;在LSTM算法中添加门... 为有效防御无线网络中的DDoS攻击,保证网络服务的连续性与稳定性及安全通信,提出一种基于改进LSTM算法的无线网络DDoS攻击防御方法。该方法分析无线网络中DDoS攻击的模式特点和影响,确定网络在攻击下的流量变化规律;在LSTM算法中添加门控机制和存储单元,构建BiLSTM网络,以快速捕获DDoS攻击下无线网络中所有节点的流量数据集;依据检测结果,采用弹性一致性算法拦截异常流量,从而实现对无线网络DDoS的防御。实验结果表明,所提方法可以快速、准确地检测流量表中的无线网络DDoS攻击,实现有效防御,数据包转发成功率大于96%,对无线网络DDoS攻击具有很好的防御效果,可以保证网络服务的连续性。 展开更多
关键词 改进LSTM算法 无线网络 ddos攻击 攻击防御 弹性一致性 流量数据 攻击模式
在线阅读 下载PDF
SDN环境下双阶段DDoS攻击检测方法
3
作者 包晓安 范云龙 +3 位作者 涂小妹 胡天缤 张娜 吴彪 《电信科学》 北大核心 2026年第2期135-147,共13页
针对软件定义网络(software-defined network,SDN)中分布式拒绝服务(distributed denial of service,DDoS)攻击检测存在的特征丢失、模型计算复杂度高以及检测实时性不足等问题,提出了一种系统化的检测框架。首先,提出一种融合流级与包... 针对软件定义网络(software-defined network,SDN)中分布式拒绝服务(distributed denial of service,DDoS)攻击检测存在的特征丢失、模型计算复杂度高以及检测实时性不足等问题,提出了一种系统化的检测框架。首先,提出一种融合流级与包级双粒度信息的流量表征方法,以多尺度挖掘攻击行为的关键特征,提升流量表征信息的完整性。其次,构建基于Mamba架构的轻量级检测模型DDoSMamba。该模型首先利用状态空间建模与全局感受野机制,降低序列建模中的计算资源与内存消耗;然后引入双向信息交互机制,增强对序列前后文关系的建模能力;最后结合低秩近似分解与特征子空间划分策略,显著压缩参数规模与推理开销。最后,进一步设计双阶段DDoS攻击检测方法:第一阶段,利用Tsallis熵对粗粒度特征进行快速筛查,排除大量正常流量;第二阶段,基于细粒度特征进行高精度分类,实现快速响应与精准检测的平衡。在CIC-IDS2019数据集上的实验结果表明,本文所提方法在二分类与多分类任务中分别达到99.96%与99.93%的准确率,平均检测耗时仅为0.067 2 ms,参数量低至4.553 8 KB。 展开更多
关键词 软件定义网络 ddos攻击检测 流量表征 双阶段检测分类
在线阅读 下载PDF
基于Takens-Transformer与GCN的DDoS攻击检测
4
作者 邓钰洋 芦天亮 +2 位作者 李知皓 孟昊阳 李锦儒 《计算机应用研究》 北大核心 2026年第2期567-576,共10页
针对现有分布式拒绝服务(DDoS)攻击检测适应性弱、计算成本高的问题,提出基于时间延迟嵌入和图卷积网络的Transformer模型(TDE-TGCN)。该模型利用Takens定理将网络流量建模为动力学系统,通过时间延迟嵌入揭示DDoS攻击对流量非线性特征... 针对现有分布式拒绝服务(DDoS)攻击检测适应性弱、计算成本高的问题,提出基于时间延迟嵌入和图卷积网络的Transformer模型(TDE-TGCN)。该模型利用Takens定理将网络流量建模为动力学系统,通过时间延迟嵌入揭示DDoS攻击对流量非线性特征的影响;采用Transformer模型将流量序列映射至高维空间,通过多头注意力机制捕捉突发性和全局关联;结合图卷积网络挖掘拓扑信息及跨节点攻击模式。在CIC-IDS2017等数据集和特征变异模拟的未知攻击场景下,TDE-TGCN检测准确率达到98.7%,误报率降低至1.2%,计算效率提升35%;消融实验验证了各组件对模型性能的显著贡献。该研究从动力学系统角度重新审视网络流量特征,提出理论与实践相结合的检测框架,为复杂网络环境下的DDoS攻击检测提供了有效技术方案。 展开更多
关键词 网络流量 ddos攻击检测 Takens定理 图卷积网络 TRANSFORMER
在线阅读 下载PDF
面向SDN流表多模态感知与DRL协同防御DDoS方法
5
作者 徐泽鹏 舒兆港 +2 位作者 陈淑武 涂强 庄涛 《计算机应用研究》 北大核心 2026年第2期596-603,共8页
软件定义网络(SDN)的集中化控制架构在提升管理效率的同时,面临分布式拒绝服务(DDoS)攻击风险。针对传统检测方法难以应对大规模动态流量中的隐蔽攻击行为,且易误封短时高并发正常流量的问题,提出一种基于多模态深度强化学习的DDoS防御... 软件定义网络(SDN)的集中化控制架构在提升管理效率的同时,面临分布式拒绝服务(DDoS)攻击风险。针对传统检测方法难以应对大规模动态流量中的隐蔽攻击行为,且易误封短时高并发正常流量的问题,提出一种基于多模态深度强化学习的DDoS防御系统。该系统通过融合时空特征解耦与智能决策优化,实现检测精度与资源效率的动态平衡,在资源充足时最大程度规避对非攻击流量的拒绝服务。实验结果显示,其攻击检测准确率平均达99.61%,误封率最高不超过0.5%,在保证高准确率的前提下降低了合法流量误封,实现了防御过程对网络服务质量的保障。 展开更多
关键词 软件定义网络 分布式拒绝服务攻击 对抗深度强化学习网络 张量分解
在线阅读 下载PDF
Evaluation and Benchmarking of Cybersecurity DDoS Attacks Detection Models through the Integration of FWZIC and MABAC Methods
6
作者 Alaa Mahmood Isa Avcı 《Computer Systems Science & Engineering》 2025年第1期401-417,共17页
A Distributed Denial-of-Service(DDoS)attack poses a significant challenge in the digital age,disrupting online services with operational and financial consequences.Detecting such attacks requires innovative and effect... A Distributed Denial-of-Service(DDoS)attack poses a significant challenge in the digital age,disrupting online services with operational and financial consequences.Detecting such attacks requires innovative and effective solutions.The primary challenge lies in selecting the best among several DDoS detection models.This study presents a framework that combines several DDoS detection models and Multiple-Criteria Decision-Making(MCDM)techniques to compare and select the most effective models.The framework integrates a decision matrix from training several models on the CiC-DDOS2019 dataset with Fuzzy Weighted Zero Inconsistency Criterion(FWZIC)and MultiAttribute Boundary Approximation Area Comparison(MABAC)methodologies.FWZIC assigns weights to evaluate criteria,while MABAC compares detection models based on the assessed criteria.The results indicate that the FWZIC approach assigns weights to criteria reliably,with time complexity receiving the highest weight(0.2585)and F1 score receiving the lowest weight(0.14644).Among the models evaluated using the MABAC approach,the Support Vector Machine(SVM)ranked first with a score of 0.0444,making it the most suitable for this work.In contrast,Naive Bayes(NB)ranked lowest with a score of 0.0018.Objective validation and sensitivity analysis proved the reliability of the framework.This study provides a practical approach and insights for cybersecurity practitioners and researchers to evaluate DDoS detection models. 展开更多
关键词 Cybersecurity attack ddos attacks ddos detection MABAC FWZIC
在线阅读 下载PDF
Detecting and Mitigating Distributed Denial of Service Attacks in Software-Defined Networking
7
作者 Abdullah M.Alnajim Faisal Mohammed Alotaibi Sheroz Khan 《Computers, Materials & Continua》 2025年第6期4515-4535,共21页
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited late... Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment. 展开更多
关键词 Software-defined networking(SDN) distributed denial of service(ddos)attack sampling Flow(sFlow) OpenFlow OpenDaylight controller
在线阅读 下载PDF
SDN-Enabled IoT Based Transport Layer DDoS Attacks Detection Using RNNs
8
作者 Mohammad Nowsin Amin Sheikh Muhammad Saibtain Raza +4 位作者 I-Shyan Hwang Md.Alamgir Hossain Ihsan Ullah Tahmid Hasan Mohammad Syuhaimi Ab-Rahman 《Computers, Materials & Continua》 2025年第11期4043-4066,共24页
The rapid advancement of the Internet ofThings(IoT)has heightened the importance of security,with a notable increase in Distributed Denial-of-Service(DDoS)attacks targeting IoT devices.Network security specialists fac... The rapid advancement of the Internet ofThings(IoT)has heightened the importance of security,with a notable increase in Distributed Denial-of-Service(DDoS)attacks targeting IoT devices.Network security specialists face the challenge of producing systems to identify and offset these attacks.This researchmanages IoT security through the emerging Software-Defined Networking(SDN)standard by developing a unified framework(RNN-RYU).We thoroughly assess multiple deep learning frameworks,including Convolutional Neural Network(CNN),Long Short-Term Memory(LSTM),Feed-Forward Convolutional Neural Network(FFCNN),and Recurrent Neural Network(RNN),and present the novel usage of Synthetic Minority Over-Sampling Technique(SMOTE)tailored for IoT-SDN contexts to manage class imbalance during training and enhance performance metrics.Our research has significant practical implications as we authenticate the approache using both the self-generated SD_IoT_Smart_City dataset and the publicly available CICIoT23 dataset.The system utilizes only eleven features to identify DDoS attacks efficiently.Results indicate that the RNN can reliably and precisely differentiate between DDoS traffic and benign traffic by easily identifying temporal relationships and sequences in the data. 展开更多
关键词 ddos attack detection IoT-SDN SD_IoT_Smart_City RNNs
在线阅读 下载PDF
Machine Learning-Based Detection of DDoS Attacks in VANETs for Emergency Vehicle Communication
9
作者 Bappa Muktar Vincent Fono Adama Nouboukpo 《Computers, Materials & Continua》 2025年第12期4705-4727,共23页
Vehicular Ad Hoc Networks(VANETs)are central to Intelligent Transportation Systems(ITS),especially for real-time communication involving emergency vehicles.Yet,Distributed Denial of Service(DDoS)attacks can disrupt sa... Vehicular Ad Hoc Networks(VANETs)are central to Intelligent Transportation Systems(ITS),especially for real-time communication involving emergency vehicles.Yet,Distributed Denial of Service(DDoS)attacks can disrupt safety-critical channels and undermine reliability.This paper presents a robust,scalable framework for detecting DDoS attacks in highway VANETs.We construct a new dataset with Network Simulator 3(NS-3)and Simulation of Urban Mobility(SUMO),enriched with real mobility traces from Germany’s A81 highway(OpenStreetMap).Three traffic classes are modeled:DDoS,Voice over IP(VoIP),and Transmission Control Protocol Based(TCP-based)video streaming(VideoTCP).The pipeline includes normalization,feature selection with SHapley Additive exPlanations(SHAP),and class balancing via Synthetic Minority Over-sampling Technique(SMOTE).Eleven classifiers are benchmarked—including eXtreme Gradient Boosting(XGBoost),Categorical Boosting(CatBoost),Adaptive Boosting(AdaBoost),Gradient Boosting(GB),and an Artificial Neural Network(ANN)—using stratified 5-fold cross-validation.XGBoost,GB,CatBoost and ANN achieve the highest performance(weighted F1-score=97%).To assess robustness under non-ideal conditions,we introduce an adversarial evaluation with packet-loss and traffic-jitter(small-sample deformation);the top models retain strong performance,supporting real-time applicability.Collectively,these results demonstrate that the proposed highway-focused framework is accurate,resilient,and well-suited for deployment in VANET security for emergency communications. 展开更多
关键词 VANET ddos attacks emergency vehicles machine learning intrusion detection NS-3 SUMO traffic classification supervised learning artificial neural network
在线阅读 下载PDF
Detection of Real-Time Distributed Denial-of-Service (DDoS) Attacks on Internet of Things (IoT) Networks Using Machine Learning Algorithms
10
作者 Zaed Mahdi Nada Abdalhussien +1 位作者 Naba Mahmood Rana Zaki 《Computers, Materials & Continua》 SCIE EI 2024年第8期2139-2159,共21页
The primary concern of modern technology is cyber attacks targeting the Internet of Things.As it is one of the most widely used networks today and vulnerable to attacks.Real-time threats pose with modern cyber attacks... The primary concern of modern technology is cyber attacks targeting the Internet of Things.As it is one of the most widely used networks today and vulnerable to attacks.Real-time threats pose with modern cyber attacks that pose a great danger to the Internet of Things(IoT)networks,as devices can be monitored or service isolated from them and affect users in one way or another.Securing Internet of Things networks is an important matter,as it requires the use of modern technologies and methods,and real and up-to-date data to design and train systems to keep pace with the modernity that attackers use to confront these attacks.One of the most common types of attacks against IoT devices is Distributed Denial-of-Service(DDoS)attacks.Our paper makes a unique contribution that differs from existing studies,in that we use recent data that contains real traffic and real attacks on IoT networks.And a hybrid method for selecting relevant features,And also how to choose highly efficient algorithms.What gives the model a high ability to detect distributed denial-of-service attacks.the model proposed is based on a two-stage process:selecting essential features and constructing a detection model using the K-neighbors algorithm with two classifier algorithms logistic regression and Stochastic Gradient Descent classifier(SGD),combining these classifiers through ensemble machine learning(stacking),and optimizing parameters through Grid Search-CV to enhance system accuracy.Experiments were conducted to evaluate the effectiveness of the proposed model using the CIC-IoT2023 and CIC-DDoS2019 datasets.Performance evaluation demonstrated the potential of our model in robust intrusion detection in IoT networks,achieving an accuracy of 99.965%and a detection time of 0.20 s for the CIC-IoT2023 dataset,and 99.968%accuracy with a detection time of 0.23 s for the CIC-DDoS 2019 dataset.Furthermore,a comparative analysis with recent related works highlighted the superiority of our methodology in intrusion detection,showing improvements in accuracy,recall,and detection time. 展开更多
关键词 ddos service NETWORKS
在线阅读 下载PDF
Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning
11
作者 Misbah Anwer Ghufran Ahmed +3 位作者 Maha Abdelhaq Raed Alsaqour Shahid Hussain Adnan Akhunzada 《Computers, Materials & Continua》 2026年第1期744-758,共15页
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an... The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security. 展开更多
关键词 Cyber-attack intrusion detection system(IDS) deep federated learning(DFL) zero-day attack distributed denial of services(ddos) MULTI-CLASS Internet of Things(IoT)
在线阅读 下载PDF
Explainable Hybrid AI Model for DDoS Detection in SDN-Enabled Internet of Vehicle
12
作者 Oumaima Saidani Nazia Azim +5 位作者 Ateeq Ur Rehman Akbayan Bekarystankyzy Hala Abdel Hameed Mostafa Mohamed R.Abonazel Ehab Ebrahim Mohamed Ebrahim Sarah Abu Ghazalah 《Computers, Materials & Continua》 2026年第5期499-526,共28页
The convergence of Software Defined Networking(SDN)in Internet of Vehicles(IoV)enables a flexible,programmable,and globally visible network control architecture across Road Side Units(RSUs),cloud servers,and automobil... The convergence of Software Defined Networking(SDN)in Internet of Vehicles(IoV)enables a flexible,programmable,and globally visible network control architecture across Road Side Units(RSUs),cloud servers,and automobiles.While this integration enhances scalability and safety,it also raises sophisticated cyberthreats,particularly Distributed Denial of Service(DDoS)attacks.Traditional rule-based anomaly detection methods often struggle to detectmodern low-and-slowDDoS patterns,thereby leading to higher false positives.To this end,this study proposes an explainable hybrid framework to detect DDoS attacks in SDN-enabled IoV(SDN-IoV).The hybrid framework utilizes a Residual Network(ResNet)to capture spatial correlations and a Bi-Long Short-Term Memory(BiLSTM)to capture both forward and backward temporal dependencies in high-dimensional input patterns.To ensure transparency and trustworthiness,themodel integrates the Explainable AI(XAI)technique,i.e.,SHapley Additive exPlanations(SHAP).SHAP highlights the contribution of each feature during the decision-making process,facilitating security analysts to understand the rationale behind the attack classification decision.The SDN-IoV environment is created in Mininet-WiFi and SUMO,and the hybrid model is trained on the CICDDoS2019 security dataset.The simulation results reveal the efficacy of the proposed model in terms of standard performance metrics compared to similar baseline methods. 展开更多
关键词 Explainable AI software defined networking Internet of vehicles ddos attack ResNet BiLSTM
在线阅读 下载PDF
A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection
13
作者 Noor Mueen Mohammed Ali Hayder Seyed Amin Hosseini Seno +2 位作者 Hamid Noori Davood Zabihzadeh Mehdi Ebady Manaa 《Computers, Materials & Continua》 2026年第4期1216-1242,共27页
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t... Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist. 展开更多
关键词 ddos detection graph neural networks multi-scale learning ensemble learning network security stealth attacks network graphs
在线阅读 下载PDF
Switching-Like Sliding Mode Security Control Against DoS Attacks:A Novel Attack-Related Adaptive Event-Triggered Scheme
14
作者 Jiancun Wu Zhiru Cao +1 位作者 Engang Tian Chen Peng 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期137-148,共12页
In this paper,a security defense issue is investigated for networked control systems susceptible to stochastic denial of service(DoS) attacks by using the sliding mode control method.To utilize network communication r... In this paper,a security defense issue is investigated for networked control systems susceptible to stochastic denial of service(DoS) attacks by using the sliding mode control method.To utilize network communication resources more effectively,a novel adaptive event-triggered(AET) mechanism is introduced,whose triggering coefficient can be adaptively adjusted according to the evolution trend of system states.Differing from existing event-triggered(ET) mechanisms,the proposed one demonstrates exceptional relevance and flexibility.It is closely related to attack probability,and its triggering coefficient dynamically adjusts depending on the presence or absence of an attack.To leverage attacker information more effectively,a switching-like sliding mode security controller is designed,which can autonomously select different controller gains based on the sliding function representing the attack situation.Sufficient conditions for the existence of the switching-like sliding mode secure controller are presented to ensure the stochastic stability of the system and the reachability of the sliding surface.Compared with existing time-invariant control strategies within the triggered interval,more resilient defense performance can be expected since the correlation with attack information is established in both the proposed AET scheme and the control strategy.Finally,a simulation example is conducted to verify the effectiveness and feasibility of the proposed security control method. 展开更多
关键词 Adaptive event-triggered(AET)mechanism denial of service(DoS)attacks networked control systems(NCSs) sliding mode control(SMC)
在线阅读 下载PDF
抗DDoS攻击下的鲁棒负荷频率控制
15
作者 钱正浩 刘冯政 +4 位作者 何明东 李波 李雪武 傅格话 胡一凡 《西安邮电大学学报》 2026年第2期46-55,共10页
针对网络化电力系统在分布式拒绝服务(Distributed Denial of Service,DDoS)攻击与控制器增益偏差并存导致的频率调节退化问题,提出一种将非脆弱比例积分(Non-fragile Proportional Integral,NFPI)与Q-learning自适应采样结合的采样数... 针对网络化电力系统在分布式拒绝服务(Distributed Denial of Service,DDoS)攻击与控制器增益偏差并存导致的频率调节退化问题,提出一种将非脆弱比例积分(Non-fragile Proportional Integral,NFPI)与Q-learning自适应采样结合的采样数据负荷频率控制(Load Frequency Control,LFC)框架。采用伯努利随机门控刻画由DDoS引发的指令丢失与阻塞,构建含状态、采样保持与能量积分项的Lyapunov-Krasovskii泛函,并配合线性矩阵不等式(Linear Matrix Inequalities,LMIs)给出H_(∞)稳定性判据与控制器综合。同时以频差和攻击指示等构成学习状态,将候选采样间隔离散为动作空间并设计兼顾误差与通信代价的回报函数以在线优化采样策略。仿真表明,在较高攻击概率下该方案仍能实现频率快速且近乎无过冲的收敛,并在保持可比稳态精度的前提下显著减少采样与控制更新,从而在增益不确定与对抗性丢包并存时兼顾鲁棒性与通信效率,适于现代网络化电力系统部署。 展开更多
关键词 电力系统 分布式拒绝服务攻击 负荷频率控制 LYAPUNOV-KRASOVSKII泛函 H_(∞)稳定性判据 Q学习自适应采样
在线阅读 下载PDF
基于CNN-BiLSTM的ICMPv6 DDoS攻击检测方法
16
作者 王春兰 郭峰 +2 位作者 刘晋州 王明华 韩宝安 《火力与指挥控制》 北大核心 2025年第4期71-78,84,共9页
针对ICMPv6网络中DDoS攻击检测问题,提出一种基于CNN-BiLSTM网络的检测算法。通过将带有注意力机制、DropConnect和Dropout混合使用加入到CNN-BiLSTM算法中,防止在训练过程中产生过拟合问题,同时更准确提取数据的特性数据。通过实验表明... 针对ICMPv6网络中DDoS攻击检测问题,提出一种基于CNN-BiLSTM网络的检测算法。通过将带有注意力机制、DropConnect和Dropout混合使用加入到CNN-BiLSTM算法中,防止在训练过程中产生过拟合问题,同时更准确提取数据的特性数据。通过实验表明:提出的算法在多次实验中的检测准确率、误报率与漏报率平均值分别为92.84%、4.49%和10.54%,检测算法泛化性较强,性能优于其他算法,能够有效处理ICMPv6 DDoS攻击检测问题。 展开更多
关键词 分布式拒绝服务攻击 攻击检测 ICMPV6 CNN BiLSTM
在线阅读 下载PDF
基于混合特征选择的低延时DDoS攻击检测
17
作者 谢丽霞 王嘉敏 +2 位作者 杨宏宇 胡泽 成翔 《计算机应用》 北大核心 2025年第10期3231-3240,共10页
许多分布式拒绝服务(DDoS)攻击检测方法侧重提升模型性能,但忽略流量样本分布和特征维度对检测性能的影响,导致模型学习多余信息。针对网络流量类不平衡和特征冗余问题,提出一种基于多评价标准的混合特征选择方法(HFS-MEC)。首先,综合... 许多分布式拒绝服务(DDoS)攻击检测方法侧重提升模型性能,但忽略流量样本分布和特征维度对检测性能的影响,导致模型学习多余信息。针对网络流量类不平衡和特征冗余问题,提出一种基于多评价标准的混合特征选择方法(HFS-MEC)。首先,综合考虑皮尔逊相关系数(PCC)和互信息(MI),选出相关性特征;其次,设计基于方差膨胀因子(VIF)的序列后向选择(SBS)算法,减少特征冗余,进一步降低特征维度;同时,为了平衡检测性能和计算时间,设计基于简单循环单元(SRU)的低延时DDoS攻击检测(L-DDoS-SRU)模型。在CICIDS2017和CICDDoS2019数据集上的实验结果表明,HFS-MEC将特征维度从78和88分别减少至31和41。在CICDDoS2019数据集上,L-DDoS-SRU检测时间仅40.34 s;召回率达99.38%,与长短期记忆(LSTM)相比提高了8.47%,与门控循环单元(GRU)相比提高了9.76%。以上验证了所提方法能有效提高检测性能并减少检测时间。 展开更多
关键词 类不平衡 特征冗余 混合特征选择 低延时 分布式拒绝服务攻击检测 简单循环单元
在线阅读 下载PDF
An Abnormal Network Flow Feature Sequence Prediction Approach for DDoS Attacks Detection in Big Data Environment 被引量:20
18
作者 Jieren Cheng Ruomeng Xu +2 位作者 Xiangyan Tang Victor S.Sheng Canting Cai 《Computers, Materials & Continua》 SCIE EI 2018年第4期95-119,共25页
Distributed denial-of-service(DDoS)is a rapidly growing problem with the fast development of the Internet.There are multitude DDoS detection approaches,however,three major problems about DDoS attack detection appear i... Distributed denial-of-service(DDoS)is a rapidly growing problem with the fast development of the Internet.There are multitude DDoS detection approaches,however,three major problems about DDoS attack detection appear in the big data environment.Firstly,to shorten the respond time of the DDoS attack detector;secondly,to reduce the required compute resources;lastly,to achieve a high detection rate with low false alarm rate.In the paper,we propose an abnormal network flow feature sequence prediction approach which could fit to be used as a DDoS attack detector in the big data environment and solve aforementioned problems.We define a network flow abnormal index as PDRA with the percentage of old IP addresses,the increment of the new IP addresses,the ratio of new IP addresses to the old IP addresses and average accessing rate of each new IP address.We design an IP address database using sequential storage model which has a constant time complexity.The autoregressive integrated moving average(ARIMA)trending prediction module will be started if and only if the number of continuous PDRA sequence value,which all exceed an PDRA abnormal threshold(PAT),reaches a certain preset threshold.And then calculate the probability that is the percentage of forecasting PDRA sequence value which exceed the PAT.Finally we identify the DDoS attack based on the abnormal probability of the forecasting PDRA sequence.Both theorem and experiment show that the method we proposed can effectively reduce the compute resources consumption,identify DDoS attack at its initial stage with higher detection rate and lower false alarm rate. 展开更多
关键词 ddos attack time series prediction ARIMA big data
在线阅读 下载PDF
一种模糊层次分析法驱动的DDoS危害性量化评估方法
19
作者 刘延华 许贻杰 +4 位作者 陈辉 陈洪 林睫菲 李小燕 吴德铿 《福州大学学报(自然科学版)》 北大核心 2025年第5期517-523,共7页
针对分布式拒绝服务攻击(DDoS)危害性量化评估存在的主观性强、缺乏量化评估体系等问题,提出一种基于模糊层次分析法(FAHP)的DDoS危害性量化评估方法.首先,从网络服务质量、网络性能、系统基础性能角度,构建多层次的DDoS危害性量化评估... 针对分布式拒绝服务攻击(DDoS)危害性量化评估存在的主观性强、缺乏量化评估体系等问题,提出一种基于模糊层次分析法(FAHP)的DDoS危害性量化评估方法.首先,从网络服务质量、网络性能、系统基础性能角度,构建多层次的DDoS危害性量化评估指标体系.然后,设计基于FAHP的评估指标权重计算方法,在判断矩阵中引入三角模糊数量化评估指标间的隶属度,提出危害性量化指标权重计算方法,实现DDoS危害性大小评估计算.设计原型系统,用于DDoS实时检测和主动防御.相较于现有方法全面考虑指标间依赖关系,仿真实验表明,所提出的技术方法可以准确识别和量化不同危害性的攻击,为主动防御提供了重要手段. 展开更多
关键词 分布式拒绝服务攻击 主动防御 模糊层次分析法 三角模糊数 量化评估方法
在线阅读 下载PDF
Automated Controller Placement for Software-Defined Networks to Resist DDoS Attacks 被引量:4
20
作者 Muhammad Reazul Haque Saw Chin Tan +8 位作者 Zulfadzli Yusoff Kashif Nisar Lee Ching Kwang Rizaludin Kaspin Bhawani Shankar Chowdhry Rajkumar Buyya Satya Prasad Majumder Manoj Gupta Shuaib Memon 《Computers, Materials & Continua》 SCIE EI 2021年第9期3147-3165,共19页
In software-defined networks(SDNs),controller placement is a critical factor in the design and planning for the future Internet of Things(IoT),telecommunication,and satellite communication systems.Existing research ha... In software-defined networks(SDNs),controller placement is a critical factor in the design and planning for the future Internet of Things(IoT),telecommunication,and satellite communication systems.Existing research has concentrated largely on factors such as reliability,latency,controller capacity,propagation delay,and energy consumption.However,SDNs are vulnerable to distributed denial of service(DDoS)attacks that interfere with legitimate use of the network.The ever-increasing frequency of DDoS attacks has made it necessary to consider them in network design,especially in critical applications such as military,health care,and financial services networks requiring high availability.We propose a mathematical model for planning the deployment of SDN smart backup controllers(SBCs)to preserve service in the presence of DDoS attacks.Given a number of input parameters,our model has two distinct capabilities.First,it determines the optimal number of primary controllers to place at specific locations or nodes under normal operating conditions.Second,it recommends an optimal number of smart backup controllers for use with different levels of DDoS attacks.The goal of the model is to improve resistance to DDoS attacks while optimizing the overall cost based on the parameters.Our simulated results demonstrate that the model is useful in planning for SDN reliability in the presence of DDoS attacks while managing the overall cost. 展开更多
关键词 SDN automated controller placement SBC ILP ddos attack
在线阅读 下载PDF
上一页 1 2 66 下一页 到第
使用帮助 返回顶部