Researches on Brittle Seam Mining based Situation Assessment and Prediction Mechanism of DDoS Attacks in Cloud Computing Platform

被引:0
|
作者
Zhuo, Yi [1 ]
Yao, Shijun [1 ]
Liang, Wang [1 ]
机构
[1] Informat Engn Univ, Sch Sci, Zhengzhou 450001, Peoples R China
来源
关键词
Biological Invasions; Brittle Point and Brittle seam; Brittle Seam Mining; Situation Assessment and Prediction; Cloud Computing; DDoS Attacks Detection;
D O I
10.4028/www.scientific.net/AMM.519-520.262
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
According to the problem of Situation Assessment and Prediction of DDoS Attacks in Cloud Computing Platform, the concepts of Brittle Point and Brittle seam were introduced to describe the situation of an eco-system according to ranked node availability, and a Situation Assessment and Prediction Mechanism based on the Brittle Seam Mining Algorithm was proposed. In the Brittle Seam Mining Algorithm, biological features of DDoS attacks and cloud computing platform were analyzed from the point of bio-dynamics, and the analysis results indicate that bandwidth loads of the normal user access from different populations wound not reach the brittle point of an eco-system, while bandwidth load of victim under DDOS attacks will reach the brittle point. The Biological Invasions Model such as the population diffusion reaction model and the population reproduction model are adopted to predict and detect the Brittle Point and Brittle seam. Meanwhile, the GIS technology was used in the visualization of Brittle seam. The simulation results verify the applicability of this method.
引用
收藏
页码:262 / 270
页数:9
相关论文
共 50 条
  • [1] Researches on Brittle Seam Mining based Enterprise Situation Assessment and Prediction Mechanism in Hi-tech Enterprise Cooperation-Competition Network
    Zhuo, Yi
    Yao, Shijun
    26TH CHINESE CONTROL AND DECISION CONFERENCE (2014 CCDC), 2014, : 1407 - 1412
  • [2] DDoS Attacks Detection in Cloud Computing Using Data Mining Techniques
    Borisenko, Konstantin
    Smirnov, Andrey
    Novikova, Evgenia
    Shorov, Andrey
    ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS, 2016, 9728 : 197 - 211
  • [3] Study on DDoS Attacks based on DPDK in Cloud Computing
    Zhao, Xutao
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [4] Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment
    Iyengar, N. Ch. S. N.
    Ganapathy, Gopinath
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (02) : 119 - 140
  • [5] Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment
    Gupta, B. B.
    Badve, Omkar P.
    NEURAL COMPUTING & APPLICATIONS, 2017, 28 (12): : 3655 - 3682
  • [6] Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment
    B. B. Gupta
    Omkar P. Badve
    Neural Computing and Applications, 2017, 28 : 3655 - 3682
  • [7] Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques
    Borisenko, Konstantin
    Rukavitsyn, Andrey
    Gurtov, Andrei
    Shorov, Andrey
    INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2016/USMART 2016, 2016, 9870 : 303 - 315
  • [8] A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment
    Iyengar, N. Ch. Sriman Narayana
    Ganapathy, Gopinath
    Kumar, P. C. Mogan
    Abraham, Ajith
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2014, 5 (04) : 236 - 248
  • [9] A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment
    Iyengar, N. Ch. Sriman Narayana, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (05):
  • [10] Statistical-based filtering system against DDOS Attacks in Cloud Computing
    Shamsolmoali, Pourya
    Zareapoor, Masoumeh
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1234 - 1239