Method for identifying DDoS (distributed denial of service) attack flow
A flow identification and distributed technology, applied in the field of network information security, can solve the problems of inability to achieve effective defense against DDoS attacks and rapid response, and achieve the effect of avoiding a large number of attacks from being missed and reducing processing and storage overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] The following is attached image 3 The implementation of the present invention is further described, specifically comprising the following steps:
[0028] (1) Source host attack detection. The source host uses the CUSUM algorithm to detect changes in the number of packets arriving at the destination address, and sends an alarm packet to the router connected to it if suspicious conditions are found.
[0029] The CUSUM algorithm uses the product of the number of data packets and the size of the source host as a detection indicator for detection, and detects DDoS attacks at the source host where the traffic changes slowly, and the abnormal information and attack characteristics are not obvious. let x m,n Represents reaching the destination address D within time n m The product of the number of data packets and the size, MaxEx is x when there is no network attack m,n expected maximum value, compute y m,n =max(0,y m,n-1 +x m,n -MaxEx), n=1, 2, ..., m = 1, 2, ..., y m...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 