Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application layer DDoS attack detection method and device

An attack detection and application layer technology, applied in the field of network security, can solve problems such as poor detection effect

Inactive Publication Date: 2018-07-13
BEIJING JIAOTONG UNIV
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Application layer DDoS attack is a form of network attack with strong operability and serious attack damage. Its main attack target is commercial or government servers. In order to ensure network security, many application layer DDoS attack detection products have been launched on the market. Most of them use abnormal pattern matching to detect the offensiveness of data flow, that is, according to the previous attack data flow, summarize the attack data flow characteristics and behavior methods, when the existing access data flow and attack data flow characteristics and behavior methods have a high degree of matching When , it is judged that the data flow is an attack data flow. The big disadvantage of this method is that when a new attack pattern is generated, because there is no data method that can be learned and summarized, the detection effect of this method is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application layer DDoS attack detection method and device
  • Application layer DDoS attack detection method and device
  • Application layer DDoS attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0057] The method of the embodiment of the present invention establishes an application layer DDoS attack detection method based on the fuzzy comprehensive evaluation method. By studying the normal user access log data of the server, an attack detection model is established, and the data flow of the access server is analyzed to attack it. sex is judged. This method is applied to the server side...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an application layer DDoS attack detection method and device. The method comprises the following steps: extracting access feature information from access data; obtaining a membership function of a comment set corresponding to each evaluation factor; determining a membership function corresponding to an access feature value according to the evaluation factor corresponding to the access feature information; calculating a membership degree of the access feature information for each comment set according to the membership function; and determining whether an access requestcorresponding to the access data is a DDoS attack. By adoption of the technical scheme, the accuracy and efficiency of detection are effectively improved, the false positive rate and the missed rateare reduced, and the security of the server is further improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an application layer DDoS attack detection method and device. Background technique [0002] Application layer DDoS attack is a form of network attack with strong operability and serious attack damage. Its main attack target is commercial or government servers. In order to ensure network security, many application layer DDoS attack detection products have been launched on the market. Most of them use abnormal pattern matching to detect the offensiveness of data flow, that is, according to the previous attack data flow, summarize the attack data flow characteristics and behavior methods, when the existing access data flow and attack data flow characteristics and behavior methods have a high degree of matching When , it is judged that the data flow is an attack data flow. The big disadvantage of this method is that when a new attack pattern is generated, because there is no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1458H04L63/168
Inventor 李红辉张骏温张彩霞
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products