论文标题

部分可观测时空混沌系统的无模型预测

LDoS attack detection method based on traffic time-frequency characteristics

论文作者

Fu, Yu, Duan, Xueyuan, Wang, Kun, Li, Bin

论文摘要

对于传统的拒绝服务攻击检测方法具有复杂的算法和高度计算开销,这很难满足在线检测的需求;实验环境主要是一个模拟平台,很难在实际的网络环境中部署,我们根据流量数据的时频特性提出了一种实现网络环境环境的LDOS攻击检测方法。所有流过Web服务器的流量数据都是通过采集存储系统获得的,并且检测数据集是使用预处理构建的;流片段的简单特征用作输入,深层神经网络用于学习正常流量特征的时频域特征并生成重建的序列,并且根据重建序列之间的差异和时间频率域中的输入数据之间的差异来区分LDOS攻击。实验结果表明,所提出的方法可以在很短的时间内准确检测流量片段中的攻击特征,并为复杂和不同的LDOS攻击实现高检测精度。由于仅使用数据包的统计功能,因此无需解析数据包数据,这些数据可以适应不同的网络环境。

For the traditional denial-of-service attack detection methods have complex algorithms and high computational overhead, which are difficult to meet the demand of online detection; and the experimental environment is mostly a simulation platform, which is difficult to deploy in real network environment, we propose a real network environment-oriented LDoS attack detection method based on the time-frequency characteristics of traffic data. All the traffic data flowing through the Web server is obtained through the acquisition storage system, and the detection data set is constructed using pre-processing; the simple features of the flow fragments are used as input, and the deep neural network is used to learn the time-frequency domain features of normal traffic features and generate reconstructed sequences, and the LDoS attack is discriminated based on the differences between the reconstructed sequences and the input data in the time-frequency domain. The experimental results show that the proposed method can accurately detect the attack features in the flow fragments in a very short time and achieve high detection accuracy for complex and diverse LDoS attacks; since only the statistical features of the packets are used, there is no need to parse the packet data, which can be adapted to different network environments.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源