Journal on Communications ›› 2018, Vol. 39 ›› Issue (5): 11-22.doi: 10.11959/j.issn.1000-436x.2018073
• Papers • Previous Articles Next Articles
Zhijun WU,Liang LIU,Meng YUE
Revised:
2018-02-06
Online:
2018-05-01
Published:
2018-06-01
Supported by:
CLC Number:
Zhijun WU,Liang LIU,Meng YUE. Detection method of LDoS attacks based on combination of ANN & KPCA[J]. Journal on Communications, 2018, 39(5): 11-22.
[13] | ZHANG C W , YIN J P , CAI Z P ,et al. Active queue management algorithm to counter DDoS attacks[J]. Journal of Software, 2011,22(9): 2182-2192. |
[14] | HAMLET M R , MICHEL K , BéATRICE P P . TCP and network coding:equilibrium and dynamic properties[J]. IEEE/ACM Transactions on Networking, 2016,24(4): 1935-1947. |
[15] | ZHAO Y , MA Z G , ZHENG X F ,et al. An improved algorithm of nonlinear RED based on membership cloud theory[J]. Chinese Journal of Electronics, 2017,26(3): 537-543. |
[16] | GUIRGUIS M. , BESTAVROS A , MATTA I . Exploiting the transients of adaptation for RoQ attacks on Internet re-sources[C]// IEEE ICNP. 2004: 184-195. |
[17] | 高海华, 杨辉华, 王行愚 ,等. 基于PCA和KPCA特征抽取的SVM网络入侵检测方法[J]. 华东理工大学学报(自然科学版), 2006,32(3): 321-326. |
GAO H H , YANG H H , WANG X Y ,et al. PCA/KPCA feature extraction approach to SVM for anomaly detection[J]. Journal of East China University of Science and Technology, 2006,32(3): 321-326. | |
[18] | ZHANG X Y , WU Z J , CHEN J S ,et al. An adaptive KPCA approach for detecting LDoS attack[J]. International Journal of Communication Systems, 2017,30(4): 1-8. |
[19] | ZHANG C W , CAI Z , CHEN W ,et al. Flow level detection and filtering of low-rate DDoS[J]. Computer Networks the International Journal of Computer & Telecommunications Networking, 2012,56(15): 3417-3431. |
[20] | FENG W C , KANDLUR D D , SAHA D ,et al. Stochastic fair blue:a queue management algorithm for enforcing fairness[C]// The 20th Joint Conference of the IEEE Computer & Communications Societies. 2001: 1520-1529. |
[21] | MOHAN L , BIJESH M G , JOHN J K . Survey of low rate denial of service (LDoS) attack on RED and its counter strategies[C]// IEEE International Conference on Computational Intelligence & Computing Research. 2012: 1-7. |
[22] | 苏治, 傅晓媛 . 核主成分遗传算法与 SVR 选股模型改进[J]. 统计研究, 2013,30(5): 54-62. |
SU Z , FU X Y . Kernel principal component genetic algorithm and improved SVR stock selection model[J]. Statistical Research, 2013,30(5): 54-62. | |
[23] | LI J , YU L . Using BP neural networks for the simulation of energy consumption[C]// IEEE International Conference on Systems,Man and Cybernetics. 2014: 3542-3547. |
[24] | 刘陶, 何炎祥, 熊琦 . 一种基于Q学习的LDoS攻击实时防御机制及其CPN实现[J]. 计算机研究与发展, 2011,48(3): 432-439. |
[1] | KUZMANOVIC A , KNIGHTLY E W . Low-rate TCP-targeted denial of service attacks -the shrew vsthe mice and elephants[C]// ACM SIGCOMM. 2003: 25-29. |
[2] | KUZMANOVIC A , KNIGHTLY E W . Low-rate TCP-targeted denial of service attacks and counter strategies[J]. IEEE/ACM Transactions on Networking, 2006,14(4): 683-696. |
[3] | 何炎祥, 刘陶, 曹强 ,等. 低速率拒绝服务攻击研究综述[J]. 计算机科学与探索, 2008,2(1): 1-19. |
HE Y X , LIU T , CAO Q ,et al. A survey of low-rate denial-of-service attacks[J]. Journal of Frontiers of Computer Science and Technology, 2008,2(1): 1-19. | |
[24] | LIU T , HE Y X , XIONG Q . A Q-learning based real-time mitigating mechanism against LDoS attack and its modeling and simulation with CPN[J]. Journal of Computer Research and Development, 2011,48(3): 432-439. |
[25] | WU Z J , ZHANG L Y , YUE M . Low-rate DoS attacks detection based on network multifractal[J]. IEEE Transactions on Dependable & Secure Computing, 2016,13(5): 559-567. |
[4] | 岳猛, 张才峰, 吴志军 . 隐马尔科夫模型检测 LDoS 攻击方法的研究[J]. 信号处理, 2015,31(11): 1454-1460. |
YUE M , ZHANG C F , WU Z J . The research of detecting LDoS attacks based on hidden Markov model[J]. Journal of Signal Processing, 2015,31(11): 1454-1460. | |
[26] | 赵峰, 张军英 . 一种 KPCA 的快速算法[J]. 控制与决策, 2007,22(9): 1044-1048. |
ZHAO F , ZHANG J Y . Fast algorithm about KPCA[J]. Control and Decision, 2007,22(9): 1044-1048. | |
[5] | YU C , KAI H , KWOK Y K . Collaborative defense against periodic shrew DDoS attacks in frequency domain[J]. ACM Transactions on Information and System Security, 2005: 2-27. |
[6] | 何炎祥, 曹强, 刘陶 ,等. 一种基于小波特征提取的低速率DoS检测方法[J]. 软件学报, 2009,20(4): 930-941. |
HE Y X , CAO Q , LIU T ,et al. A low-rate DoS detection method based on feature extraction using wavelet transform[J]. Journal of Software, 2009,20(4): 930-941. | |
[7] | LIU X , ZHANG M , XU G . Construction of distributed LDoS attack based on one-dimensional random walk algorithm[C]// International Conference on Cloud Computing and Intelligence Systems. 2012: 685-689. |
[8] | 张静, 胡华平, 刘波 ,等. 基于ASPQ的LDoS攻击检测方法[J]. 通信学报, 2012,33(5): 79-84. |
ZHANG J , HU H P , LIU B ,et al. Detecting LDoS attack based on ASPQ[J]. Journal on Communications, 2012,33(5): 79-84. | |
[9] | SUN J , ZUKERMAN M . An adaptive neuron AQM for a stable internet[M]// Ad Hoc and Sensor Networks,Wireless Networks,Next Generation Internet. Springer Berlin Heidelberg, 2007: 844-854. |
[10] | KUZMANOVIC A . The power of explicit congestion notification[J]. ACM Sigcomm Computer Communication Review, 2005,35(4): 61-72. |
[11] | SARAT S , TERZIS A . On the effect of router buffer sizes on low-rate denial of service attacks[C]// International Conference on Computer Communications and Networks. 2005: 281-286. |
[12] | MOHAN L , JOHN J K , BIJESH M G . Shrew attack prevention in RED queue with partial flow analysis[J]. International Journal of Computer Applications, 2013,67(8): 9-15. |
[13] | 张长旺, 殷建平, 蔡志平 ,等. 抗 DDoS 攻击的主动队列管理算法[J]. 软件学报, 2011,22(9): 2182-2192. |
[1] | Jinyin CHEN, Haiyang XIONG, Haonan MA, Yayu ZHENG. CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack [J]. Journal on Communications, 2023, 44(4): 154-166. |
[2] | Jianfeng LI, Zheyu LIU, Yang RONG, Zhan LI, Bolin LIAO, Linxi QU, Zhijie LIU, Kunhuang LIN. Zeroing neural network for time-varying convex quadratic programming with linear noise [J]. Journal on Communications, 2023, 44(4): 226-233. |
[3] | Yun LIN, Huaitao XU, Sen WANG, Sicheng ZHANG, Long ZHUANG. Objective assessment of communication speech interference effect based on feature fusion [J]. Journal on Communications, 2023, 44(3): 105-116. |
[4] | Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG. Feature dependence graph based source code loophole detection method [J]. Journal on Communications, 2023, 44(1): 103-117. |
[5] | Shiwen HE, Jun YUAN, Zhenyu AN, Min ZHANG, Yongming HUANG, Yaoxue ZHANG. GNN-based optimization algorithm for joint user scheduling and beamforming [J]. Journal on Communications, 2022, 43(7): 73-84. |
[6] | Tao LENG, Lijun CAI, Aimin YU, Ziyuan ZHU, Jian’gang MA, Chaofei LI, Ruicheng NIU, Dan MENG. Review of threat discovery and forensic analysis based on system provenance graph [J]. Journal on Communications, 2022, 43(7): 172-188. |
[7] | Yurong LIAO, Haining WANG, Cunbao LIN, Yang LI, Yuqiang FANG, Shuyan NI. Research progress of deep learning-based object detection of optical remote sensing image [J]. Journal on Communications, 2022, 43(5): 190-203. |
[8] | Fan ZHANG, Yun HUANG, Zizhuo FANG, Wei GUO. Lost-minimum post-training parameter quantization method for convolutional neural network [J]. Journal on Communications, 2022, 43(4): 114-122. |
[9] | Zhengyu ZHU, Gengwang HOU, Chongwen HUANG, Gangcan SUN, Wanming HAO, Jing LIANG. Systems resource allocation algorithm for RIS-assisted D2D secure communication based on parallel CNN [J]. Journal on Communications, 2022, 43(3): 172-179. |
[10] | Junyan HUO, Danni WANG, Yanzhuo MA, Shuai WAN, Fuzheng YANG. Efficient cross-component prediction for H.266/VVC based on lightweight fully connected networks [J]. Journal on Communications, 2022, 43(2): 143-155. |
[11] | Hua LONG, Zhangheng HUANG, Yubin SHAO, Qingzhi DU, Shumeng SU. Research on language recognition algorithm based on improved CFCC feature extraction [J]. Journal on Communications, 2022, 43(12): 211-221. |
[12] | Xueyuan DUAN, Yu FU, Kun WANG, Bin LI. LDoS attack detection method based on simple statistical features [J]. Journal on Communications, 2022, 43(11): 53-64. |
[13] | Zhengyu ZHU, Pengfei CHEN, Zixuan WANG, Kexian GONG, Di WU, Zhongyong WANG. Short wave protocol signals recognition based on Swin-Transformer [J]. Journal on Communications, 2022, 43(11): 127-135. |
[14] | Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN. Towards edge-collaborative, lightweight and privacy-preserving classification framework [J]. Journal on Communications, 2022, 43(1): 127-137. |
[15] | Yiteng WU, Wei LIU, Hongtao YU. Label flipping adversarial attack on graph neural network [J]. Journal on Communications, 2021, 42(9): 65-74. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|