Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

DDoS attack detection method and device, computer equipment and storage medium

An attack detection and target device technology, applied in the field of network security, can solve the problems of low detection accuracy, inapplicability to the Internet of Things environment, and high detection delay

Pending Publication Date: 2020-05-19
CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above DDoS attack detection methods are all aimed at the DDoS attack detection method in the Internet environment, and are not suitable for the Internet of Things environment; in addition, the above DDoS attack detection methods also have the disadvantages of high detection time delay and low detection accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DDoS attack detection method and device, computer equipment and storage medium
  • DDoS attack detection method and device, computer equipment and storage medium
  • DDoS attack detection method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] For details, please refer to figure 1 , figure 1 It is a schematic flowchart of the basic flow of the method for DDoS attack detection in this embodiment.

[0079] Such as figure 1 Shown, a kind of method for DDoS attack detection comprises the following steps:

[0080] S1100. Obtain the Internet of Things traffic of the target device;

[0081] Internet of Things traffic refers to the data traffic generated by the network services performed by the target device in the Internet of Things environment. In some embodiments, the target device is an intelligent electronic device connected to the Internet of Things, including but not limited to: smart phones, computers, tablets Computers, vehicle-mounted smart devices, etc., the target device will generate IoT traffic in the IoT environment. Taking the target device as a PC (Personal Computer, personal computer) terminal as an example, when the user enters the Internet of Things by using a PC terminal, the system can obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a DDoS attack detection method and device, computer equipment and a storage medium. The DDoS attack detection method comprises the following steps: acquiringInternet of Things flow of target equipment; performing feature extraction on the Internet of Things flow according to preset DDoS attack features to obtain joint entropy features; training an extremelearning machine algorithm by using the joint entropy features to obtain a DDoS attack detection algorithm; and carrying out DDoS attack detection by adopting the DDoS attack detection algorithm. According to the embodiment of the invention, the joint entropy features in the Internet of Things flow are extracted; the extreme learning machine algorithm is trained by using the joint entropy features to obtainthe DDoS attack detection algorithm; the DDoS attack detection algorithm can be used for carrying out DDoS attack detection; the features of the DDoS attack are combined, the flow characteristics suitable for the Internet of Things environment are extracted, training and flow detection classification are carried out by adopting the extreme learning machine algorithm, the detection classification accuracy is high, the training time is short, and the DDoS attack in the Internet of Things environment can be accurately and timely detected.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of network security, in particular to a DDoS attack detection method, device, computer equipment and storage medium. Background technique [0002] With the development of the Internet of Things, the number of global Internet of Things devices has grown rapidly, and "Internet of Everything" has become an important direction for the future development of the network. In recent years, security incidents under the Internet of Things have been increasing year by year. The global Internet of Things security spending is keep growing. The lack of security design of IoT devices and their own vulnerabilities, such as the use of a single protocol in the IoT environment, simple and numerous devices, and relatively fixed bandwidth, make IoT devices likely to be manipulated into puppet machines that launch DDoS attacks. Therefore, once the Internet of Things devices are used by hackers, user dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1458
Inventor 王晨光冯剑李姣姣
Owner CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products