A DDoS Attack Situation Assessment Method via Optimized Cloud Model Based on Influence Function

被引:6
|
作者
Tang, Xiangyan [1 ]
Zheng, Qidong [1 ]
Cheng, Jieren [1 ,2 ]
Sheng, Victor S. [3 ]
Cao, Rui [1 ]
Chen, Meizhu [1 ]
机构
[1] Hainan Univ, Key Lab Internet Informat Retrieval Hainan Prov, Haikou 570228, Hainan, Peoples R China
[2] Hainan Univ, Coll Informat Sci & Technol, Haikou 570228, Hainan, Peoples R China
[3] Univ Cent Arkansas, Dept Comp Sci, Conway, AR 72035 USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2019年 / 60卷 / 03期
基金
海南省自然科学基金; 中国国家自然科学基金;
关键词
DDoS attack; V-SVM; influence function; cloud model; RISK-ASSESSMENT MODEL; SECURITY;
D O I
10.32604/cmc.2019.06173
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existing network security situation assessment methods cannot effectively assess the Distributed denial-of-service (DDoS) attack situation. In order to solve these problems, we propose a DDoS attack situation assessment method via optimized cloud model based on influence function. Firstly, according to the state change characteristics of the IP addresses which are accessed by new and old user respectively, this paper defines a fusion feature value. Then, based on this value, we establish a V-Support Vector Machines (V-SVM) classification model to analyze network flow for identifying DDoS attacks. Secondly, according to the change of new and old IP addresses, we propose three evaluation indexes. Furthermore, we propose index weight calculation algorithm to measure the importance of different indexes. According to the fusion index, which is optimized by the weighted algorithm, we define the Risk Degree (RD) and calculate the RD value of each network node. Then we obtain the situation information of the whole network according to the RD values, which are from each network nodes with different weights. Finally, the whole situation information is classified via cloud model to quantitatively assess the DDoS attack situation. The experimental results show that our method can not only improve the detection rate and reduce the missing rate of DDoS attacks, but also access the DDoS attack situation effectively. This method is more accurate and flexible than the existing methods.
引用
收藏
页码:1263 / 1281
页数:19
相关论文
共 50 条
  • [1] APT Attack Situation Assessment Model Based on Optimized BP Neural Network
    Fu, Tian
    Lu, YiQin
    Zhen, Wang
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2108 - 2111
  • [2] Early warning model of DDoS attack situation based on adaptive threshold
    Luo Y.-H.
    Cheng J.-R.
    Tang X.-Y.
    Ou M.-W.
    Wang T.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2020, 54 (04): : 704 - 711
  • [3] A Spark-Based DDoS Attack Detection Model in Cloud Services
    Zhang, Jian
    Zhang, Yawei
    Liu, Pin
    He, Jianbiao
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2016, 2016, 10060 : 48 - 64
  • [4] A confidence-based filtering method for DDoS attack defense in cloud environment
    Dou, Wanchun
    Chen, Qi
    Chen, Jinjun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07): : 1838 - 1850
  • [5] A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud
    Haddadi, Mohamed
    Beghdad, Rachid
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (04) : 42 - 56
  • [6] DDoS Attack Detection Method Based on Linear Prediction Model
    Cheng, Jieren
    Yin, Jianping
    Wu, Chengkun
    Zhang, Boyun
    Liu, Yun
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 1004 - +
  • [7] A DoS Attack Situation Assessment Method Based on QoS
    Liu Yu-hua
    Zhang Hong-qi
    Yang Ying-jie
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1041 - 1045
  • [8] Game based DDoS Attack Strategies in Cloud of Things
    Wang, Yichuan
    Zhang, Yefei
    Zhang, Liumei
    Zhu, Lei
    Liu, Yanxiao
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2016, 97 : 759 - 762
  • [9] Optimized Edge-cCCN Based Model for the Detection of DDoS Attack in IoT Environment
    Gupta, Brij B.
    Gaurav, Akshat
    Chui, Kwok Tai
    Arya, Varsha
    EDGE COMPUTING - EDGE 2023, 2024, 14205 : 14 - 23
  • [10] DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm
    Zhang, Ruizhi
    Cheng, Jieren
    Tang, Xiangyan
    Liu, Qiang
    He, Xiangfeng
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 654 - 669