Researches on Brittle Seam Mining based Situation Assessment and Prediction Mechanism of DDoS Attacks in Cloud Computing Platform

被引:0
|
作者
Zhuo, Yi [1 ]
Yao, Shijun [1 ]
Liang, Wang [1 ]
机构
[1] Informat Engn Univ, Sch Sci, Zhengzhou 450001, Peoples R China
来源
关键词
Biological Invasions; Brittle Point and Brittle seam; Brittle Seam Mining; Situation Assessment and Prediction; Cloud Computing; DDoS Attacks Detection;
D O I
10.4028/www.scientific.net/AMM.519-520.262
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
According to the problem of Situation Assessment and Prediction of DDoS Attacks in Cloud Computing Platform, the concepts of Brittle Point and Brittle seam were introduced to describe the situation of an eco-system according to ranked node availability, and a Situation Assessment and Prediction Mechanism based on the Brittle Seam Mining Algorithm was proposed. In the Brittle Seam Mining Algorithm, biological features of DDoS attacks and cloud computing platform were analyzed from the point of bio-dynamics, and the analysis results indicate that bandwidth loads of the normal user access from different populations wound not reach the brittle point of an eco-system, while bandwidth load of victim under DDOS attacks will reach the brittle point. The Biological Invasions Model such as the population diffusion reaction model and the population reproduction model are adopted to predict and detect the Brittle Point and Brittle seam. Meanwhile, the GIS technology was used in the visualization of Brittle seam. The simulation results verify the applicability of this method.
引用
收藏
页码:262 / 270
页数:9
相关论文
共 50 条
  • [21] Study of Layers Construct for Data Mining Platform Based on Cloud Computing
    Lin, Yongzheng
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 106 - 112
  • [22] A research of safety mechanism in cloud computing platform based on Virtualization
    Xu, Chengjun
    Tian, Quanhong
    Zhang, Heng
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 245 - 248
  • [23] Mean Availability Parameter-Based DDoS Detection Mechanism for Cloud Computing Environments
    Amuthan, Arjunan
    Harikrishna, Pillutla
    WIRELESS COMMUNICATION NETWORKS AND INTERNET OF THINGS, VOL VI, 2019, 493 : 115 - 122
  • [24] A novel model for securing mobile-based systems against DDoS attacks in cloud computing environment
    El-Sofany H.F.
    El-Seoud S.A.
    International Journal of Interactive Mobile Technologies, 2019, 13 (01) : 85 - 98
  • [25] Intrusion detection in cloud computing based attacks patterns and risk assessment
    Ben Charhi, Youssef
    Mannane, Nada
    Bendriss, Elmehdi
    Regragui, Boubker
    PROCEEDINGS OF 2016 THIRD INTERNATIONAL CONFERENCE ON SYSTEMS OF COLLABORATION (SYSCO), 2016, : P92 - P95
  • [26] Data Stream Mining Based-Outlier Prediction for Cloud Computing
    Souiden, Imen
    Brahmi, Zaki
    Lafi, Lamine
    DIGITAL ECONOMY: EMERGING TECHNOLOGIES AND BUSINESS INNOVATION, ICDEC 2017, 2017, 290 : 131 - 142
  • [27] Research on Cloud-Based Safe Computing Platform Resource Prediction
    Hao, Guoze
    Ma, Lianchuan
    SEVENTH INTERNATIONAL CONFERENCE ON TRAFFIC ENGINEERING AND TRANSPORTATION SYSTEM, ICTETS 2023, 2024, 13064
  • [28] Study on Data Mining Platform based on Cloud Computing and Its Key Techniques
    Li, Li
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2018), 2018, 78 : 89 - 92
  • [29] IPGOD: An Integrated Visualization Platform Based on Big Data Mining and Cloud Computing
    Chen, Wei-Yu
    Lu, Peggy Joy
    Shiau, Steven
    ICBDC 2019: PROCEEDINGS OF 2019 4TH INTERNATIONAL CONFERENCE ON BIG DATA AND COMPUTING, 2019, : 11 - 16
  • [30] A DDoS Attack Situation Assessment Method via Optimized Cloud Model Based on Influence Function
    Tang, Xiangyan
    Zheng, Qidong
    Cheng, Jieren
    Sheng, Victor S.
    Cao, Rui
    Chen, Meizhu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (03): : 1263 - 1281