Supercharge Your Innovation With Domain-Expert AI Agents!

LDoS attack detection and mitigation scheme based on ensemble learning and peak searching algorithm

An attack detection and integrated learning technology, applied in integrated learning, transmission systems, electrical components, etc., can solve the problems that normal users cannot effectively access the server, are not suitable for big data, and have weak real-time performance, so as to alleviate adverse effects, improve Real-time and ability to process big data, the effect of low time and space complexity

Active Publication Date: 2021-05-14
HUNAN UNIV
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It severely degrades the quality of service by sending periodic high-speed attack pulses, causing normal users to be unable to effectively access the server
[0003] The current real-time detection and mitigation solutions for LDoS attacks have the following problems: First, the network traffic when an LDoS attack occurs is very similar to the network traffic when a large number of legitimate users access the network at the same time, which is extremely concealed and difficult to be detected by traditional firewalls. Or anti-denial of service attack mechanism identification; secondly, the existing real-time detection methods of LDoS attacks have certain defects, such as high cost, poor scalability, low detection accuracy, not suitable for big data, weak real-time performance, etc.; The third is that under the traditional network architecture, the deployment of mitigation solutions requires additional equipment or changes to existing protocols, which is costly and difficult to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • LDoS attack detection and mitigation scheme based on ensemble learning and peak searching algorithm
  • LDoS attack detection and mitigation scheme based on ensemble learning and peak searching algorithm
  • LDoS attack detection and mitigation scheme based on ensemble learning and peak searching algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040]The present invention will be further described below in conjunction with the accompanying drawings.

[0041] Such as Figure 5 As shown, the algorithm flow of the LDoS attack detection and mitigation scheme based on ensemble learning and peak-finding algorithm mainly includes four steps: data sampling, feature calculation, attack detection and attack mitigation. The data sampling step includes two parts: training data sampling and test data sampling. The training data obtained by sampling is divided into multiple detection windows based on the sliding window algorithm, and the detection windows are marked. The marks are divided into normal and abnormal, and the test data is based on the sliding window algorithm. The detection window is obtained by sampling in real time. The characteristic calculating step calculates the characteristic of the flow in the detection window according to the formula. The attack detection step trains an ensemble learning classifier accordin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an LDoS attack detection and mitigation scheme based on ensemble learning and a peak searching algorithm, and belongs to the field of computer network security. The method comprises the following steps: acquiring flow flowing through a bottleneck link in a period of time by using an SDN controller as training data; using a sliding window to divide training data into a plurality of detection windows and mark the windows; dividing the marks into normal (without LDoS attack) and abnormal (with LDoS attack); calculating an average value, a variable coefficient, an average absolute time derivative and a waveform cumulative length of the TCP flow of the detection window as characteristics; inputting the marks and the features into an ensemble learning algorithm to train a classifier; classifying the test data acquired in real time by using a classifier to obtain class marks; if yes, positioning an attacker based on a peak searching algorithm, and discarding the attack flow; otherwise, continuing real-time sampling. According to the LDoS attack detection and mitigation scheme provided by the invention, the LDoS attack can be effectively detected, and the influence caused by the attack can be quickly mitigated.

Description

technical field [0001] The invention belongs to the field of computer network security, in particular to an LDoS attack detection and mitigation scheme based on integrated learning and peak-seeking algorithms. Background technique [0002] LDoS (Low-rate Denial of Service, low-rate denial of service) attack, as a variant of denial of service attack, is an attack launched against the vulnerability of the adaptive mechanism in the network protocol. It severely degrades the quality of service by sending periodic high-speed attack pulses, causing normal users to be unable to effectively access the server. [0003] The current real-time detection and mitigation solutions for LDoS attacks have the following problems: First, the network traffic when an LDoS attack occurs is very similar to the network traffic when a large number of legitimate users access the network at the same time, which is extremely concealed and difficult to be detected by traditional firewalls. Or anti-denia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N20/20
CPCH04L63/1458H04L63/1416G06N20/20
Inventor 汤澹张斯琦陈静文冯叶王曦茵李欣萌
Owner HUNAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More