DDOS attack detection method in cloud environment

A DDOS and attack detection technology, applied in the field of information security, can solve the problems of low coverage and accuracy, and achieve the effects of improving accuracy, reducing false alarm rate, and relieving pressure

Pending Publication Date: 2021-06-01
山西警察学院
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problems of low coverage and accuracy of existing DDOS detection methods, the present invention provides a DDOS attack detection method in a cloud environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DDOS attack detection method in cloud environment
  • DDOS attack detection method in cloud environment
  • DDOS attack detection method in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] DDOS attack detection method in the cloud environment, including the deployment of edge computing and features, such as figure 2 As shown, the data, especially the DDOS attack data, is simply processed and monitored in real time through different functions in the edge computing architecture. Using K-means clustering algorithm and its process analysis such as image 3 As shown, it is integrated with the DDOS feature model technology to complete the clustering of DDOS attack data, improve the detection rate, and greatly reduce the false negative rate and false positive rate of detection of known and unknown attack types.

[0020] The above-mentioned DDOS attack detection method under the cloud environment comprises the following steps:

[0021] Step 1: Arrange the edge computing model on the edge side of the cloud platform. When the cloud platform enters the traffic data, use the edge nodes in the edge computing to realize the information collection and simple processin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an information security technology, in particular to a DDOS attack detection method in a cloud environment, which is mainly used for detecting and tracking DDOS attacks in the cloud environment. The system comprises an edge computing and feature model combination technology, carries out real-time monitoring and simple analysis processing by using an edge computing network architecture, fuses a feature technology into a k-means algorithm, carries out supplement and deep detection on omitted DDOS attacks, and after the DDOS attacks are detected, actively initiates IP tracking in the cloud platform by using an improved probability packet mark, so that the DDOS attack detection system in the cloud environment is completed.

Description

technical field [0001] The invention relates to information security technology, in particular to a DDOS attack detection method in a cloud environment, mainly for detecting and tracking DDOS attacks in a cloud environment. Background technique [0002] With the rapid development of cloud computing, its platform also has some security problems, especially DDOS attacks are rampant and threatening. However, some existing detection methods have low coverage and can only detect low-speed or low-attack DDOS, and there are still problems with low false positive and false positive rates, and may ignore other types of DDOS during detection. The characteristic DDOS leads to a decrease in the accuracy rate. At the same time, some inappropriate redundancy will cause a waste of space and resources on the cloud platform, and some do not form a complete system, which is not compatible with today's cloud platform and cannot work together. Therefore, it is necessary to propose a DDOS attac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1458G06F18/23213
Inventor 朱飑凯李慧敏刘三满李峰张婵
Owner 山西警察学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products