期刊文献+

一种基于小波分析的DDoS攻击检测方法 被引量:3

Detecting method for DDoS attack based on wavelet analysis
下载PDF
导出
摘要 通过对网络流量的分形特性和分布式拒绝服务(DDoS)的特点进行研究,提出了一种基于小波分析的DDoS攻击检测方法,并设计了该方法检测攻击的模型。对网络流量的分形特性进行判断,然后对具有自相似特性和多重分形特性的网络流量,分别采用基于小波分析的Hurst指数方差法和基于多窗口小波分析的Holder指数法检测DDoS攻击。通过对DARPA2000年数据的实验表明,该方法能够有效地检测到攻击,对大流量背景攻击、低速率攻击、反射式攻击也都达到了较高的检测率,比传统方法有效。 On the basis of analyzing the fractal property of network traffic and the features of Distributed Denial of Service(DDoS) attacks, a method of DDoS attack detection based on wavelet analysis is presented, and the attack detection model is designed. It judges the fractal features of network traffic, then adopts a method of variance of Hurst exponent based on wavelet analysis detect attack when it is self-similar or a method of Holder exponent based on multi-window wavelet analysis detect attack when it is multi-fractal. On the DARPA/Lincoln laboratory intrusion detection evaluation data set 2000, the experimental results show that this method is effective, and detection rate is high on the big background traffic DDoS attack, low-rate DDoS attack, and reflection DDoS attack, which is better than the traditional method.
作者 任义龙 刘渊
出处 《计算机工程与应用》 CSCD 2012年第31期82-88,共7页 Computer Engineering and Applications
基金 国家自然科学基金(No.60875036)
关键词 分布式拒绝服务 自相似性 多重分形 HURST参数 Holder指数 多窗口小波分析 Distributed Denial of Service(DDoS) self-similar multi-fractal Hurst parameter Holder exponent multi-window wavelet analysis
  • 相关文献

参考文献15

  • 1Leland W E, Taqqu M S, Willinger W, et al.On the self-similar nature of Ethemet traffic(Extended Version) [J]. IEEE/ACM Trans on Networking, 1994,2 ( 1 ): 1-15.
  • 2Abry P, Veitch D.Wavelet analysis of long-range dependence traffic[J].IEEE Trans on Information Theory, 1998,44(1):2-15.
  • 3Crovella M E, Bestavros.A self-similarity in World Wide Web traffic-evidence and possible cause[C]//Proceedings of ACM Sigmetries, 1996: 160-169.
  • 4傅雷扬,王汝传,王海艳,任勋益.R/S方法求解网络流量自相似参数的实现与应用[J].南京航空航天大学学报,2007,39(3):358-362. 被引量:10
  • 5王江涛,杨庚.VTP检测算法的改进和基于模糊逻辑的DDoS攻击自适应判断[J].仪器仪表学报,2008,29(2):342-348. 被引量:8
  • 6任勋益,王汝传,王海艳.基于自相似检测DDoS攻击的小波分析方法[J].通信学报,2006,27(5):6-11. 被引量:56
  • 7任勋益,王汝传,王海艳,李金明.基于自相似检测DDoS攻击的小波选择[J].南京航空航天大学学报,2007,39(5):588-592. 被引量:8
  • 8Tang Y J, Xia P L, Zi J Y.Fault detection through multi-fractal nature of traffic[C]//Proc of IEEE on Communications, Circuits and Systems and West Sino Expositions, 2002 : 695-699.
  • 9Hu J C, Wang Y, Dou R S.Hybrid multi-scale modeling of network traffic[C]//Proceedings of the International Conference on Wireless Communications,2005 : 987-990.
  • 10Ren J G, Li J P, Xie H T, et al.Modeling the scaling properties of network traffic with discrete wavelet trans- form[C]//Proceedings of International Conference on Sensing, Computing and Automation, 2006 : 360-364.

二级参考文献59

共引文献105

同被引文献35

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部