Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (3): 24-34.doi: 10.11959/j.issn.2096-109x.2018020
• Papers • Previous Articles Next Articles
Bin ZHANG1,2,Zihao LIU1,2(),Shuqin DONG1,2,Lixun LI1,2
Revised:
2018-02-02
Online:
2018-03-01
Published:
2018-04-09
Supported by:
CLC Number:
Bin ZHANG,Zihao LIU,Shuqin DONG,Lixun LI. App-DDoS detection method using partial binary tree based SVM algorithm[J]. Chinese Journal of Network and Information Security, 2018, 4(3): 24-34.
[1] | 陈飞, 毕小红, 王晶晶 ,等. DDoS攻击防御技术发展综述[J]. 网络与信息安全学报, 2017,3(10): 16-24. |
CHEN F , BI X H , WANG J J ,et al. Survey of DDoS defense:challenges and directions[J]. Chinese Journal of Network and Information Security, 2017,3(10): 16-24. | |
[2] | SINGH K , SINGH P , KUMAR K . Application layer HTTP-GET flood DDoS attacks:research landscape and challenges[J]. Computer & Security, 2016,65: 344-372. |
[3] | 李锦玲, 王斌强 . 基于最大频繁序列模式挖掘的 App-DDoS 攻击的异常检测[J]. 电子与信息学报, 2013,35(7): 1739-1745. |
LI J L , WANG B Q . Detecting App-DDoS attacks based on maximal frequent sequential pattern mining[J]. Journal of Electronics &Information Technology, 2013,35(7): 1739-1745. | |
[4] | SANGJAE L , GISUNG K , SEHUM K . Sequence-order- independent network profiling for detecting application layer DDoS attacks[J]. Eurasip Journal on Wireless Communication & Networking, 2011,50(1): 1-9. |
[5] | 杨宏宇, 常媛 . 基于 K 均值多重主成分分析的 App-DDoS 检测方法[J]. 通信学报, 2014,35(5): 16-24. |
YANG H Y , CHANG Y . App-DDoS detection method based on K-means multiple principal component analysis[J]. Journal on Communications, 2014,35(5): 16-24. | |
[6] | YU S , THAPNGAM T , LIU J ,et al. Discriminating DDoS flows from flash crowds using information distance[C]// IEEE The 3rd International Conference on Network and System Security. 2009: 351-356. |
[7] | LI K , ZHOU W L , LI P ,et al. Distinguishing DDoS attacks from flash crowds using probability metrics[C]// IEEE The 3rd International Conference on Network and System Security. 2009: 9-17. |
[8] | YU S , ZHOU W L , JIA W J ,et al. Discriminating DDoS attacks from flash crowds using flow correlation coefficient[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,23(6): 1073-1080. |
[9] | SINGH KJ , THONGAM K , DE T . Entropy-based application layer DDoS attack detection using artificial neural networks[J].Entropy,2016:18(10),350-367. Entropy, 2016,18(10): 350-367. |
[10] | NI T G , GUX Q , WANG H Y ,et al. Real-Time detection of applica tion-layer DDoS attack using time series analysis[J]. Journal of Control Science and Engineering, 2013(5): 1-6. |
[11] | IRFAN S , AMIT M , VIBHAKAR M . Machine learning techniques used for the detection and analysis of morden types of DDoS attacks[J]. International Research Journal of Engineering and Technology, 2017,4(6): 16-24. |
[12] | LIU L , JIN X L , MIN G Y ,et al. Anomaly diagnosis based on regression and classification analysis of statistical traffic features[J]. Security and Communication Networks, 2014,7: 1372-1383. |
[13] | PAL R , KUMAR S , SHARMA R L . A detailed classification of flash events:client,server and network characteristics[C]// The International Conference on Computer Science & Service System. 2012: 960-963. |
[14] | 杨新武, 马壮, 袁顺 . 基于弱分类器调整的多分类 Adaboost 算法[J]. 电子与信息学报, 2016,38(2): 373-380. |
YANG X W , MA Z , YUAN S . Multi-classification adaboost algorithm based on weak classifier adjustment[J]. Journal of Electronics& Information Technology, 2016,38(2): 373-380. | |
[15] | KANGS , CHOS Z , PILSUNG K . Constructing a multi-class classifier using one-against-one approach with different binary classifier[J]. Neurocomputing, 2015,149: 677-682. |
[16] | SILVA C , RIBEIRO B . Multiclass ensemble of one-against-all SVM classifiers[C]// The International Symposium on Neural Networks. 2016: 531-539. |
[17] | JINDAL A , DUA A , KAUR K ,et al. Decision tree and SVM-based data analytics for theft detection in smart grid[J]. IEEE Transactions on Industrial Informatics, 2016,12(3): 1005-1016. |
[18] | CORTES C , VAPNIK V . Support vector networks[J]. Machine Learning, 1995,20: 273-297. |
[19] | ITA. WorldCup98[DB/OL]. . |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|