A method and system for detecting ddos attack events based on traffic logs
A technology of attack events and detection methods, which is applied in the fields of network security and big data analysis, can solve the problems of huge storage overhead and loading overhead, and achieve the effects of narrowing the scope, reducing overhead, and saving storage space
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] In order to make the above-mentioned features and advantages of the present invention more comprehensible, the following specific embodiments are described in detail in conjunction with the accompanying drawings.
[0033] This embodiment provides a method for detecting DDoS attack events based on traffic logs, such as figure 1 As shown, the steps include:
[0034] 1) Determine the statistical period, select a value between 1 second and 1 hour, determine the traffic threshold 2Mbps≤2T1≤T2≤500Mbps, and determine the ratio value R≤0.5;
[0035] 2) Routinely count the network traffic values received by all IPs in each statistical period;
[0036] 3) Store IPs whose traffic exceeds the threshold T1 and their corresponding traffic values in a single statistical period as traffic records;
[0037] 4) Filter out the IP collection whose current traffic value received in the current statistical period exceeds T2;
[0038] 5) for each IP in the IP set and its corresponding ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


