Flow log based DDoS attack event detection method and system
A technology of attack events and detection methods, applied in the fields of big data analysis and network security, can solve the problems of huge storage overhead and loading overhead, and achieve the effects of narrowing the scope, saving storage space, and reducing overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] In order to make the above-mentioned features and advantages of the present invention more comprehensible, the following specific embodiments are described in detail in conjunction with the accompanying drawings.
[0033] This embodiment provides a method for detecting DDoS attack events based on traffic logs, such as figure 1 As shown, the steps include:
[0034] 1) Determine the statistical period, select a value between 1 second and 1 hour, determine the traffic threshold 2Mbps≤2T1≤T2≤500Mbps, and determine the ratio value R≤0.5;
[0035] 2) Routinely count the network traffic values received by all IPs in each statistical period;
[0036] 3) Store IPs whose traffic exceeds the threshold T1 and their corresponding traffic values in a single statistical period as traffic records;
[0037] 4) Filter out the IP collection whose current traffic value received in the current statistical period exceeds T2;
[0038] 5) for each IP in the IP set and its corresponding ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


