Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for detecting DDoS attack in real time based on lifting wavelets

A real-time detection and wavelet coefficient technology, applied in the field of network security, can solve the problems of real-time monitoring of DDoS attacks and other problems, and achieve the effect of improving network security

Inactive Publication Date: 2019-07-26
YANCHENG INST OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when detecting DDoS, there is still no research on the relationship between business flow sampling samples and H value, and there are still big problems in the real-time monitoring of DDoS attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting DDoS attack in real time based on lifting wavelets
  • Method for detecting DDoS attack in real time based on lifting wavelets
  • Method for detecting DDoS attack in real time based on lifting wavelets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the objects and advantages of the present invention clearer, the present invention will be specifically described below in conjunction with examples. It should be understood that the following words are only used to describe one or several specific implementation modes of the present invention, and do not strictly limit the protection scope of the specific claims of the present invention.

[0028] A method for real-time detection of DDoS attacks based on lifting wavelets, comprising the following steps:

[0029] A1: Real-time estimation of Hurst parameter value based on lifting wavelet;

[0030] A2: The DDoS flow attack is detected through the jump of the Hurst parameter value.

[0031] Among them, the Hurst parameter value estimation based on wavelet specifically includes: for a self-similar random process X(t), {X(t), t∈R}, satisfying X(t)=a -H X(at), a is a positive real number, H>0 is the Hurst parameter, and the equal sign means equal in the stat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for detecting a DDoS attack in real time based on a lifting wavelet. The method comprises the following steps: A1, estimating a Hurst parameter value based on the lifting wavelet in real time; A2, detecting the attack of the DDoS stream through the jump of the Hurst parameter value. According to the technical scheme, the method for detecting the DDoS attack in real time based on the lifting wavelet is provided. In an NS2 network simulation environment, the relationship between the Hurst parameter and a related service flow sampling sample during DDoS detectionis studied, and then the DDoS attack is detected in real time by using the relationship between the Hurst parameter and the related service flow sampling sample, so that the network security is effectively improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for real-time detection of DDoS attacks based on lifting wavelets. Background technique [0002] DDoS (Distributed Denial of Service) attack is currently the most difficult attack on the Internet. The existence of DDoS attack flow will lead to changes in the self-similarity of network traffic, causing the Hurst parameter value (H value) (since Leland, Taqqu, Willinger, and Wilson first The scale behavior called network self-similarity is found in the network traffic flow, which has caused extensive research due to the application potential of self-similarity in the network. The Hurst parameter H is an important parameter that characterizes the degree of self-similarity, and the value of H In (0.5,1), the larger H is, the higher the degree of self-similarity) changes, early intrusion detection for this feature has become an important research topic, and there hav...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458
Inventor 周刚王如刚黄金城
Owner YANCHENG INST OF TECH