Unlock instant, AI-driven research and patent intelligence for your innovation.

DDos attack detection method based on concentric axis multidimensional data visualization model

A multi-dimensional data and model detection technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of the influence of network security status detection, limited representation dimension, intertwined line segments cannot be distinguished, etc.

Active Publication Date: 2011-12-28
TIANJIN UNIV
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the previous research and development models, in the network security visualization model, there will be limited representation dimensions, or when the amount of data is too large, the line segments are intertwined and cannot be distinguished, which has a great impact on the detection of network security status. influences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DDos attack detection method based on concentric axis multidimensional data visualization model
  • DDos attack detection method based on concentric axis multidimensional data visualization model
  • DDos attack detection method based on concentric axis multidimensional data visualization model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The invention belongs to the field of network security visualization, and relates to a method for real-time detection of DDos attacks based on a concentric multi-dimensional data visualization algorithm. The method includes the following steps: acquisition and analysis of network data, extracting source IP address and destination IP from original network data Address and destination port number are used as the three dimensions of the visualization model; create a concentric axis multi-dimensional data visualization model, and map the source IP address, destination IP address and destination port number to the three axes of the concentric axis from the inside to the outside; adopt " The interactive method of radial distortion and angular distortion of “focus + background environment” adjusts the coordinate axis and the spatial distribution of the curve, so that the details of the concentric axis multi-dimensional data visualization graphics can be displayed more clearly; by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the network security visualization field, and relates to a DDos attack detection method based on a concentric axis multidimensional data visualization model. The method comprises the following steps: extracting a source IP address, a target IP address and a target port number from original network data, and taking the source IP address, the target IP address and the target port number as three dimensions of a visualization model; creating the concentric shaft multidimensional data visualization model, and mapping the source IP address, the target IP address and the target port number on three axes of the concentric axis from the inside out; adjusting a reference axis and curve spatial distribution by employing an interaction method of radial distortion and angle distortion of 'focus + background environment ' to display a detail of a concentric axis multidimensional data visualization graph more clearly; analyzing whether a target is attacked or not according to an obtained concentric axis graph characteristic and a DDos characteristic. According to the invention, a clear, identifiable, controllable visualization result is provided for network analysis personnel, and a possibility of discovering the DDos attack by the network analysis personnel is raised.

Description

Technical field [0001] The invention belongs to the field of network security visualization, and relates to a method for detecting DDos attacks based on a concentric axis multidimensional data visualization algorithm. Background technique [0002] DDoS is a special form of denial of service attack based on DoS. It is a distributed and coordinated large-scale attack method. The main target is relatively large sites, such as corporate sites, search engines, and government sites. A basic DoS attack can be achieved with only a single machine that can connect to the Internet. A DDoS attack uses a group of controlled machines to attack one machine, which is more destructive. [0003] Information visualization technology is based on a modern information processing platform. According to users’ needs for information, appropriate visualization symbols are used to express various information and the relationship between internal and external information, so that people can interact with in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12H04L12/26
Inventor 张加万张怡郭庆辉吕良福张亚平付磊
Owner TIANJIN UNIV