https ddos检测——研究现状
from: https://jyx.jyu.fi/bitstream/handle/123456789/52275/1/URN%3ANBN%3Afi%3Ajyu-201612125051.pdf
相关文献汇总如下:
S1 Eliseev and Gurina (2016) Algorithms for network server anomaly behavior detection without traffic content inspection ACM 1
S2 Zolotukhin et al. (2016b) Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic Scopus 1
S3 Zolotukhin et al. (2016a) Increasing Web Service Availability by Detecting Application-Layer DDoS Attacks in Encrypted Traffic IEEE, Scopus 1
S4 Zolotukhin et al. (2015) Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol Scopus 1
S5 Petiz et al. (2014) Detecting DDoS Attacks at the Source Using Multiscaling Analysis IEEE 1
S6 Wang et al. (2015) DDoS attack protection in the era of cloud computing and Software-Defined Networking ScienceDirect 1
S7 Hoeve (2013) Detecting Intrusions in Encrypted Control Traffic ACM 1
S8 Amoli and Hämäläinen (2013) A Real Time Unsupervised NIDS for Detecting Unknown and Encrypted Net- work Attacks in High Speed Network IEEE 1
S9i Das, Sharma, and Bhattacharyya (2011) Detection of HTTP Flooding Attacks in Multiple Scenarios ACM 0
S10i Shiaeles et al. (2012) Real time DDoS detection using fuzzy estimators ScienceDirect 0
S11 Chen, Chen, and Delis (2007) An Inline Detection and Prevention Framework for Distributed Denial of Service Attacks Scopus 1
S12i Lee et al. (2008) DDoS attack detection method using cluster analysis ScienceDirect 0
S13i Caulkins, Lee, and Wang (2005) A Dynamic Data Mining Technique for Intrusion Detection Systems ACM 0
S14 Abimbola, Shi, and Merabti (2003) NetHost-Sensor: A Novel Concept in Intrusion Detection Systems IEEE 0
加密的检测手段:
Table 11. Detection methods in encrypted networks from included studies Study
Detection method Strategy Features
[S1] Correlation functions & MLP Statistical analysis & Classification Server response rate metrics
[S2] Fuzzy c-means Fuzzy clustering Statistics and data from packet headers
[S3] Single-linkage, Kmeans, fuzzy c-means, SOM, DBSCAN & SAE Classification (NN) & clustering Statistics and data from packet headers
[S4] DBSCAN, K-means, k-NN, SOM, SVDD Clustering Packet header statistics
[S5] Multiscaling Analysis Statistical analysis Number of packets & average energy per timescale
[S6] Probabilistic inference graphical model Bayesian networks Chow-Liu algorithm for feature decision
[S7] Edit distance -based searching Statistical analysis & clustering time, size and direction of the packet
[S8] DBSCAN Statistical analysis & clustering Packet header and flow data in different resolutions
[S11] Signatures & stateful protocol analysis Signature & stateful protocol analysis TCP, UDP and ICMP packet headers and statistics as well as payload
[S14] Snort signatures Signature & system call sequence analysis packet payload
非加密的检测:
Table 12. Applicable methods from non-encrypted research in included studies Study
Detection method Strategy Features
[S9i] Statistical analysis, pattern disagreement and projected clustering Statistical analysis and clustering TCP header data & packet rate per interval
[S10i] Fuzzy estimator Statistical analysis Mean time between network packets
[S12i] Hierarchical clustering Clustering TCP header information & number of packets
[S13i] Classification tree Classification TCP header data
详细分析:
《Algorithms for network server anomaly behavior detection without traffic content inspection》目标是检测异常:
[S1] Eliseev and Gurina (2016) use correlation functions of data block size & number of packets per time unit observed from the webserver. They use long time intervals, i.e. three weeks of real data to train. They propose two algorithms. The first looks at the Pearson correlation coefficient between cross-correlation functions in a similar time interval in the current and training sets. The second algorithm uses a multilayer perceptron (MLP) with Levenberg-Marquardt algorithm to train and test the current cross-correlation functions. A threshold for the reconstruction error is set to determine an anomalous function. They say that these algorithms can be easily implemented as a lightweight DDoS HIDS in IoT devices. The method uses both statistical analysis and classification.
S2 Zolotukhin et al. (2016b) Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic Scopus 1
[S2] Zolotukhin et al. (2016b) propose a method for detecting DDoS attacks in encrypted network traffic in both offline and online case using fuzzy c-means clustering algorithm. In the method, they train the system with flow information such as conversation length, packet velocity, packet size averages, and flags. They build feature vectors form the information by also normalizing the values with min-max normalization. They have two different versions of the algorithm: an online and an offline version. The tests of the method are conducted using the Realistic Global Cyber Environment (RGCE), where the attacks can be simulated as realistically as possible. Slowloris, SSLsqueeze, and some advanced DDoS attacks were tested in the system and they found that the trivial cases such as Slowloris and SSLsqueeze were detected nearly 100% of the time, whereas the advanced DDoS attacks had only 70% accuracy when keeping the false positives to the minimum. Categorical classification of this method is clustering.
S3 Zolotukhin et al. (2016a) Increasing Web Service Availability by Detecting Application-Layer DDoS Attacks in Encrypted Traffic IEEE, Scopus 1
[S3] Zolotukhin et al. (2016a) study the application layer DDoS attacks in encrypted network traffic employing hierarchical, centroid- and density-based clustering algorithms and stacked auto-encoder (SAE). The features for clustering come from the packet header infor-mation and conversation to the server by each user. The conversations are mended together
S4 Zolotukhin et al. (2015) Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol Scopus 1
[S4] Zolotukhin et al. (2015) present a clustering-based anomaly-based detection method
S5 Petiz et al. (2014) Detecting DDoS Attacks at the Source Using Multiscaling Analysis IEEE 1
S6 Wang et al. (2015) DDoS attack protection in the era of cloud computing and Software-Defined Networking ScienceDirect 1
S7 Hoeve (2013) Detecting Intrusions in Encrypted Control Traffic ACM 1——感觉这种方法比较有效,先按照报文统计进行聚类,相同类别计算报文的编辑距离来判断内容相似性。
[S7] Hoeve (2013) explore an intrusion detection method for encrypted control traffic. A
S8 Amoli and Hämäläinen (2013) A Real Time Unsupervised NIDS for Detecting Unknown and Encrypted Net- work Attacks in High Speed Network IEEE 1——没懂。。。
[S8] Amoli and Hämäläinen (2013) have designed an NIDS to work with large amounts of
S9i Das, Sharma, and Bhattacharyya (2011) Detection of HTTP Flooding Attacks in Multiple Scenarios ACM 0
S10i Shiaeles et al. (2012) Real time DDoS detection using fuzzy estimators ScienceDirect 0
[S10i] Shiaeles et al. (2012) propose a detection method that uses the packets arrival times
S11 Chen, Chen, and Delis (2007) An Inline Detection and Prevention Framework for Distributed Denial of Service Attacks Scopus 1
S12i Lee et al. (2008) DDoS attack detection method using cluster analysis ScienceDirect 0
S13i Caulkins, Lee, and Wang (2005) A Dynamic Data Mining Technique for Intrusion Detection Systems ACM 0
https ddos检测——研究现状的更多相关文章
- CC 攻击检测研究现状
网络层ddos 是让去往银行的道路交通变得拥堵,无法使正真要去银行的人到达:常利用协议为网络层的,如tcp(利用三次握手的响应等待及电脑tcp 连接数限制)等应用层ddos 则是在到达银行后通过增办. ...
- 大数据DDos检测——DDos攻击本质上是时间序列数据,t+1时刻的数据特点和t时刻强相关,因此用HMM或者CRF来做检测是必然! 和一个句子的分词算法CRF没有区别!
DDos攻击本质上是时间序列数据,t+1时刻的数据特点和t时刻强相关,因此用HMM或者CRF来做检测是必然!——和一个句子的分词算法CRF没有区别!注:传统DDos检测直接基于IP数据发送流量来识别, ...
- 语义SLAM研究现状总结
博客转载自:https://blog.csdn.net/xiaoxiaowenqiang/article/details/81051010 原文标题:深度学习结合SLAM 语义slam 语义分割 端到 ...
- 全球知名的HTTPS网站检测工具-Qualys SSL Labs
推荐一个在线版全球知名的HTTPS网站检测工具-Qualys SSL Labs.Qualys SSL Labs同时也是很具有影响力的SSL安全和性能研究机构. SSL Labs会对HTTPS网站的证书 ...
- VR的国内研究现状及发展趋势
转载请声明转载地址:http://www.cnblogs.com/Rodolfo/,违者必究. 一.国内研究现状 我国虚拟现实技术研究起步较晚,与发达国家还有一定的差距. 随着计算机图形学.计算机系统 ...
- NLP+语篇分析(五)︱中文语篇分析研究现状(CIPS2016)
摘录自:CIPS2016 中文信息处理报告<第三章 语篇分析研究进展.现状及趋势>P21 CIPS2016 中文信息处理报告下载链接:http://cips-upload.bj.bcebo ...
- NLP+语义分析(四)︱中文语义分析研究现状(CIPS2016、角色标注、篇章分析)
摘录自:CIPS2016 中文信息处理报告<第二章 语义分析研究进展. 现状及趋势>P14 CIPS2016> 中文信息处理报告下载链接:http://cips-upload.bj. ...
- RNA测序研究现状与发展
RNA测序研究现状与发展 1 2,584 A+ 所属分类:Transcriptomics 收 藏 通常来说,某一个物种体内所有细胞里含有的DNA都应该是一模一样的,只是因为每一种细胞里所表达的R ...
- https ddos攻击——由于有了认证和加解密 后果更严重 看绿盟的产品目前对于https的ddos cc攻击需要基于内容做检测
如果web服务器支持HTTPS,那么进行HTTPS洪水攻击是更为有效的一种攻击方式,一方面,在进行HTTPS通信时,web服务器需要消耗更多的资源用来进行认证和加解密,另一方面,一部分的防护设备无法对 ...
随机推荐
- SVN库迁移整理方法----官方推荐方式
以下是subversion官方推荐的备份方式. 关闭所有运行的进程,并确认没有程序在访问存储库(如 httpd.svnserve 或本地用户在直接访问). 备份svn存储库 #压缩备份 svnadmi ...
- Spark-RDD算子
一.Spark-RDD算子简介 RDD(Resilient Distributed DataSet)是分布式数据集.RDD是Spark最基本的数据的抽象. scala中的集合.RDD相当于一个不可变. ...
- 数据展现-百度js绘图
echarts:酷炫的绘图效果 http://echarts.baidu.com/examples/#chart-type-calendar
- mysql备份的4种方式
mysql备份的4种方式 转载自:https://www.cnblogs.com/SQL888/p/5751631.html 总结: 备份方法 备份速度 恢复速度 便捷性 功能 一般用于 cp 快 快 ...
- 006-线程同步解决【ReentrantLock】
一.解决方案 004-线程同步问题引出.同步问题解决.死锁.生产者与消费者 通过以上文章可知,通过原子性AtomicLong .以及内部锁(synchronized)机制可以解决线程安全问题.以下是一 ...
- samba文件共享服务配置一(共2节)
一.samba服务简介 Samba是在Linux和UNIX系统上实现SMB协议的一个免费软件,由服务器及客户端程序构成.SMB(Server Messages Block,信息服务块)是一种在局域网上 ...
- liunx 命令行快捷键 常用命令
常用指令 ls 显示文件或目录 -l 列出文件详细信息l(list) -a 列出当前目录下所有文件及目录,包括隐藏的a(all) mkdir ...
- 牛客国庆集训派对Day3 Solution
A Knight 留坑. B Tree 思路:两次树形DP,但是要考虑0没有逆元 可以用前缀后缀做 #include <bits/stdc++.h> using namespa ...
- G.Finding the Radius for an Inserted Circle 2017 ACM-ICPC 亚洲区(南宁赛区)网络赛
地址:https://nanti.jisuanke.com/t/17314 题目: Three circles C_{a}Ca, C_{b}Cb, and C_{c}Cc, all ...
- hdu5012 圆环相交面积
题中给了 两个同心圆, 一个大圆一个小圆,然后再给了一个大圆一个小圆也是同心圆,求这两个圆环相交的面积,用两个大圆面积减去两倍大小圆面积交加上两个小圆面积交,就ok了 这里算是坑明白了 使用acos的 ...