An approach for detecting LDoS attack based on cloud model
Wei SHI , Dan TANG , Sijia ZHAN , Zheng QIN , Xiyin WANG
Front. Comput. Sci. ›› 2022, Vol. 16 ›› Issue (6) : 166821
An approach for detecting LDoS attack based on cloud model
Cybersecurity has always been the focus of Internet research. An LDoS attack is an intelligent type of DoS attack, which reduces the quality of network service by periodically sending high-speed but short-pulse attack traffic. Because of its concealment and low average rate, the traditional DoS attack detection methods are challenging to be effective. The existing LDoS attack detection methods generally have the problems of high FPR and FNR. A cloud model-based LDoS attack detection method is proposed, and a classifier based on SVM is used to train and classify the feature parameters. The detection method is verified and tested in the NS2 simulation platform and Test-bed network environment. Compared with the existing research results, the proposed method requires fewer samples, and it has lower FPR and FNR.
cybersecurity / LDoS attack / cloud model / SVM
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
Chen Z, Pham T N D, Yeo C K, Lee B S, Lau C T. FRRED: fourier robust RED algorithm to detect and mitigate LDoS attacks. In: Proceedings of Zooming Innovation in Consumer Electronics International Conference. 2017, 13–17 |
| [9] |
|
| [10] |
|
| [11] |
Kwok Y K, Tripathi R, Chen Y, Hwang K. HAWK: halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks. In: Proceedings of the 3rd International Conference on Networking and Mobile Computing. 2005, 423–432 |
| [12] |
Zhang J, Hu H P, Liu B, Chen X. Method to counter LDoS attack based on the average length of packet in the queue. In: Proceedings of International Conference of China Communication and Technology. 2010, 418–421 |
| [13] |
|
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
|
| [18] |
|
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
|
| [23] |
|
| [24] |
|
| [25] |
|
| [26] |
|
| [27] |
|
| [28] |
|
| [29] |
Li D. Artificial intelligence with uncertainty. In: Proceedings of the 4th International Conference on Computer and Information Technology. 2004, 15(11): 1583-1594 |
| [30] |
|
| [31] |
|
| [32] |
|
| [33] |
|
| [34] |
|
| [35] |
|
Higher Education Press
/
| 〈 |
|
〉 |