Unlock instant, AI-driven research and patent intelligence for your innovation.

A ddos ​​attack detection method in big data environment

An attack detection and big data technology, applied in the network field, can solve the problems of inability to meet the actual demand for high bandwidth and time-consuming, and achieve the effect of ensuring accuracy and reliability, ensuring real-time performance, and accelerating detection speed.

Active Publication Date: 2019-11-01
SHANGHAI MARITIME UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, the existing DDoS attack detection algorithms and systems use a single-machine processing method, which consumes a lot of time and cannot meet the actual needs of a big data environment with high bandwidth and a large number of user groups.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A ddos ​​attack detection method in big data environment
  • A ddos ​​attack detection method in big data environment
  • A ddos ​​attack detection method in big data environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] Hereinafter, in conjunction with the accompanying drawings, a preferred embodiment is described in detail to further illustrate the present invention.

[0069] Such as figure 1 As shown, a DDoS attack detection method in a big data environment includes the following steps:

[0070] S1. Collecting various stream data in a big data environment, that is, collecting various stream data from a big data application system; the big data application system means that there are more than tens of thousands of massive users, the amount of data is growing rapidly, and the amount of data has been Up to PB application system; said users, including registered users and non-registered users;

[0071] The various stream data includes data streams from proxy servers, data streams arriving at the system through a firewall, and various POP data streams, etc.;

[0072] S2, extract the source IP address from various collected stream data;

[0073] S3, calculating the information entropy of the source...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for detecting a DDoS (Distributed Denial of Service) attack in a big data environment. The method comprises the following steps: extracting a source IP address from various collected data streams, calculating information entropy of the source IP address, and if the information entropy is greater than a preset threshold value V, determining that the data stream corresponding to the IP address may be a DDoS attack stream, and implementing early warning; otherwise, determining that the data stream corresponding to the IP address is a normal data stream; training a dynamically-sampled K-Means model by using the normal data stream, and designing a dynamically-sampled K-Means parallelization algorithm based on a Spark stream processing technology; and detecting the data stream subjected to early warning by using the dynamically-sampled K-Means parallelization algorithm, and if a criterion function E of a detection result is smaller than or equal to a preset threshold value d, determining that the data stream is the DDoS attack stream, then blacklisting the source IP, and shielding the data stream. According to the method disclosed by the invention, various DDoS attacks in the big data environment can be effectively detected through early warning detection and abnormality confirmation detection, and thus the security of a system can be ensured.

Description

Technical field [0001] The invention relates to the field of network technology, in particular to a DDoS attack detection method in a big data environment. Background technique [0002] With the rapid development of the Internet and the general upgrade of ordinary user bandwidth, the bandwidth of home users has reached or exceeded 20M. In addition, with the popularization of 3G networks and the gradual promotion of 4G networks, the mobile Internet has also entered a period of vigorous development. The rapid growth of personal network bandwidth and the ever-increasing number of network users have caused an explosive growth of network data, and mankind has entered the era of big data. In the big data environment, more and more companies and enterprises are migrating their information technology infrastructure to cloud service providers to reduce costs, such as distributed storage data centers and various types of cloud computing systems. However, once these high-bandwidth network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1458
Inventor 刘罕韩德志毕坤李美静王军
Owner SHANGHAI MARITIME UNIVERSITY