Distributed Denial of Service Attack Detection Method Based on C4.5 Decision Tree Algorithm

A distributed rejection and attack detection technology, applied in the field of computer communication, can solve the problems of high frequency of false alarms and low detection success rate, and achieve the effect of accurate detection

Active Publication Date: 2020-06-02
NANJING UNIV OF POSTS & TELECOMM
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, potential victims and attackers can be found through continuous monitoring of data packet flow; the detection success rate of these methods is low and the frequency of false alarms is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed Denial of Service Attack Detection Method Based on C4.5 Decision Tree Algorithm
  • Distributed Denial of Service Attack Detection Method Based on C4.5 Decision Tree Algorithm
  • Distributed Denial of Service Attack Detection Method Based on C4.5 Decision Tree Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Apparently, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments, and the preferred embodiments of the present invention are shown in the accompanying drawings. The present invention can be implemented in many different forms and is not limited to the embodiments described herein, on the contrary, these embodiments are provided for the purpose of making the disclosure of the present invention more thorough and comprehensive. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed denial of service attack detection method based on a C4.5 decision tree algorithm in software defined network environment, and the method comprises the followingsteps: collecting flow table information returned back by an OpenFlow switch through an OpenFlow protocol; extracting field information related to a DDoS attack from the flow table information, converting the extracted information into parameters capable of analyzing network flow distribution variation and taking the parameters as attributes, and forming a training set of a decision tree; classifying flows with the C4.5 decision tree algorithm, calculating class information entropy according to training set data classes; orderly calculating conditional entropy of the attributes, gain of information, information entropy of the attributes and information gain ratio of the attributes; selecting the attribute with the highest information gain ratio as a root node of the decision tree, and selecting the attributes with highest information gain ratio from the residual attributes as a fork node, and repeating the steps above until forming the decision tree; and using the finally formed decision tree to perform classification operation for the new network flow, and detecting whether the DDoS attack exists. The method can detect the DDoS attack more accurately.

Description

technical field [0001] The invention relates to the technical field of computer communication, and is a method for detecting a denial of service attack in a software-defined environment, in particular to a method for detecting a distributed denial of service attack based on a C4.5 decision tree algorithm. Background technique [0002] At present, the number of network devices connected to the Internet is increasing rapidly, not only the surge of mobile devices, but also the rapid growth of network devices due to the development of emerging technologies. Correspondingly, the continuous expansion of network scale will lead to more complex networks and bring more challenges. However, the existing network technology and facilities cannot realize such an increasingly complex system. In order to design future networks that can meet these rapidly developing needs, many methods have been proposed, and software-defined networking is one of the more important solutions. [0003] A p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1416H04L63/1458
Inventor 刘俊杰王珺王梦林
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products