A ddos attack detection method in big data environment
An attack detection and big data technology, applied in the network field, can solve the problems of inability to meet the actual demand for high bandwidth and time-consuming, and achieve the effect of ensuring accuracy and reliability, ensuring real-time performance, and accelerating detection speed.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0068] Hereinafter, in conjunction with the accompanying drawings, a preferred embodiment is described in detail to further illustrate the present invention.
[0069] Such as figure 1 As shown, a DDoS attack detection method in a big data environment includes the following steps:
[0070] S1. Collecting various stream data in a big data environment, that is, collecting various stream data from a big data application system; the big data application system means that there are more than tens of thousands of massive users, the amount of data is growing rapidly, and the amount of data has been Up to PB application system; said users, including registered users and non-registered users;
[0071] The various stream data includes data streams from proxy servers, data streams arriving at the system through a firewall, and various POP data streams, etc.;
[0072] S2, extract the source IP address from various collected stream data;
[0073] S3, calculating the information entropy of the source...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


