Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for detect LDoS attack data stream in cloud environment

A detection method and data flow technology, applied in transmission systems, instruments, character and pattern recognition, etc., can solve problems such as high cost, high cost, and inability to guarantee, and achieve the effect of improving service quality

Active Publication Date: 2019-01-08
SHANGHAI MARITIME UNIVERSITY
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Improving network protocols and service protocols is also a way to mitigate LDoS attacks, but the cost of this method is too high, and there is no guarantee that new network protocols can completely resist LDoS attacks, and for existing intact network protocol systems , the cost of implementing a new protocol is too high and the method is not feasible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for detect LDoS attack data stream in cloud environment
  • A method and system for detect LDoS attack data stream in cloud environment
  • A method and system for detect LDoS attack data stream in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The present invention discloses a cloud environment LDoS attack data flow detection method and system. In order to make the present invention more obvious and understandable, the present invention will be further described below in conjunction with the accompanying drawings and specific implementation methods.

[0055] Such as figure 1 As shown, the cloud environment LDoS attack data flow detection method of the present invention comprises the following steps:

[0056] S1: Simulate various LDoS attacks on network simulation software, and extract corresponding network traffic.

[0057] Among them, the network simulation software is a free software simulation platform with open source code for network technology, which can simulate real communication to the greatest extent, and set different parameters according to experimental requirements to simulate different communication processes. During the LDoS attack process, extracting the corresponding experimental data can be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for detecting LDoS attack data flow in a cloud environment. The method comprises the steps of simulating various attacks with network simulation softwareand extracting corresponding network traffic; sampling and classifying the data packets that arrive and lose on the server; extracting the average number of packets, source IP growth rate, wavelet features and congestion participation in a given period of data stream from the sample; analyzing the eigenvalues and establishing the random forest classification model, testing the established random forest model with normal data stream and abnormal data stream, calculating the corresponding information entropy for each feature classification, adjusting the threshold value of eigenvalues accordingto the information entropy, so as to achieve the best classification effect; according to the stochastic forest classification model, designing and deploying the LDoS attack data flow detection systemon the cloud server to detect and process all kinds of LDoS attack data flow in real time. The invention has the advantages of low energy consumption, high detection rate and low false alarm rate, and has high practical value.

Description

technical field [0001] The invention relates to the security field of cloud environment, in particular to a cloud environment LDoS (Low Rate Denial of Service) attack data stream detection method and system. Background technique [0002] The traditional DoS (Denial of Service, Denial of Service) attack detection method is to detect the characteristics of network data flow and server load increase rapidly in a short period of time, while the LDoS (Low-rate Denial of Service, Low-rate Denial of Service) attack performance There are many different characteristics, such as the average rate of attack data flow is low, and the server load does not change much. Therefore, traditional detection methods are not suitable for detecting LDoS attacks. [0003] According to whether it is necessary to establish the attack pattern feature library in advance, most detection methods can be divided into two categories: feature detection and anomaly detection. Feature detection For known atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1416H04L63/1458G06F18/24G06F18/214
Inventor 郭钰君韩德志毕坤王军
Owner SHANGHAI MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products