A ddos attack detection method combining svm and optimized lstm model under sdn network architecture
A network architecture and attack detection technology, applied in the field of information and communication, can solve the problems of exhaustion of controller resources, no time sequence processing, loss of relevant information, etc., to reduce system burden, reduce time-consuming detection, and reduce false alarms Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] Step 1. According to the existing LSTM model, use the improved genetic algorithm to optimize the LSTM model to obtain the optimized LSTM model;
[0023] Step 2, build a virtual SDN network topology structure;
[0024] In step 3, data is collected on the virtual SDN network topology structure built in step 2 to obtain an SDN network data set;
[0025] Step 4. Use step 3 to obtain the SDN network data set, and after standard deviation standardization and time series processing, train the optimized LSTM model obtained in step 1;
[0026] Step 5. Use step 3 to obtain the SDN network data set to train the support vector machine SVM;
[0027] Step 6: After the SDN controller is used to collect the flow table information in the virtual SDN network, the feature vector is extracted according to the feature extraction method, and the real-time extracted data is cached into a file for storage;
[0028] Step 7. The flow table feature vector extracted in step 6 is sent to the SVM ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


