Journal on Communications ›› 2018, Vol. 39 ›› Issue (7): 176-187.doi: 10.11959/j.issn.1000-436x.2018128
• Correspondences • Previous Articles Next Articles
Chuanhuang LI,Yan WU,Zhengzhe QIAN,Zhengjun SUN,Weiming WANG
Revised:
2018-05-16
Online:
2018-07-01
Published:
2018-08-08
Supported by:
CLC Number:
Chuanhuang LI,Yan WU,Zhengzhe QIAN,Zhengjun SUN,Weiming WANG. DDoS attack detection and defense based on hybrid deep learning model in SDN[J]. Journal on Communications, 2018, 39(7): 176-187.
"
特征名称 | 描述 |
durationSeconds | 持续时间 |
packetCount | 每条流中数据分组数量 |
byteCount | 每条流中数据分组比特数 |
match.eth_type | 匹配的以太网类型 |
match.eth_dst | 匹配的以太网目的地址 |
match.eth_src | 匹配的以太网源地址 |
match.in_port | 匹配的入端口 |
priority | 优先级 |
match.ipv4_src | 匹配的源IP |
match.ipv4_dst | 匹配的目的IP |
match.udp_dst | 匹配的UDP目的端口 |
match.udp_dst | 匹配的UDP源端口 |
match.tcp_dst | 匹配的TCP目的端口 |
match.tcp_dst | 匹配的TCP源端口 |
idleTimeoutSec | 空闲超时 |
match.ip_proto | 匹配的IP协议 |
durationNSeconds | 持续时间 |
cookie | Cookie |
tableId | 表ID |
hardTimeoutSec | 严格超时 |
actions.actions | 动作 |
[1] | YAN Q , YU F R , GONG Q ,et al. Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments:a survey,some research issues,and challenges[J]. IEEE Communications Surveys & Tutorials, 2016,18(1): 602-622. |
[2] | RADWARE.2017-2018 global application & network security report[R]. 2018. |
[3] | AKAMAI.[State of the Internet]/security Q4 2017 executive summary[R]. 2017. |
[4] | VOELLMY A , WANG J . Scalable software defined network controllers[J]. ACM SIGCOMM Computer Communication Review, 2012,42(4): 289-290. |
[5] | PENG T , LECKIE C , RAMAMOHANARAO K . Survey of network-based defense mechanisms countering the DoS and DDoS problems[J]. ACM Computing Surveys, 2007,39(1):3. |
[6] | MIRKOVIC J , MARTIN J , REIHER P . A taxonomy of DDoS attacks and DDoS defense mechanisms[J]. ACM SIGCOMM Computer Communication Review, 2001,34(2): 39-53. |
[7] | LI D , LI J , HUANG J ,et al. Recent advances in deep learning for speech research at Microsoft[C]// 2013 IEEE International Conference on Acoustics,Speech and Signal Processing. 2013: 8604-8608. |
[8] | YU K , . Large-scale deep learning at Baidu[C]// 22nd ACM international conference on Information & Knowledge Management. 2013: 2211-2212. |
[9] | 杨余旺, 杨静宇, 孙亚民 . 分布式拒绝服务攻击的实现机理及其防御研究[J]. 计算机工程与设计, 2004,25(5): 657-660. |
YANG Y W , YANG J Y , SUN Y M . Defense study and implementation mechanism of distributed denial of service attack[J]. Computer Engineering and Design, 2004,25(5): 657-660. | |
[10] | 孟江涛, 冯登国, 薛锐 ,等. 分布式拒绝服务攻击的原理与防范[J]. 中国科学院大学学报, 2004,21(1): 90-94. |
MENG J T , FENG D G , XUE R ,et al. Distributed denial of service attacks:principle and defense[J]. Journal of the Graduate School of the Chinese Academy of Sciences, 2004,21(1): 90-94. | |
[11] | GIL T M , POLETTO M . MULTOPS:a data-structure for bandwidth attack detection[C]// 10th Usenix Security Symposium. 2001: 23-38. |
[12] | MOUSAVI S M , ST-HILAIRE M , . Early detection of DDoS attacks against SDN controllers[C]// 2015 International Conference on Computing,Networking and Communications (ICNC). 2015: 77-81. |
[13] | WANG R , JIA Z , JU L . An entropy-based distributed DDoS detection mechanism in software-defined networking[C]// 2015 IEEE Trustcom/BigDataSE/ISPA. 2015: 310-317. |
[14] | JADIDI Z , MUTHUKKUMARASAMY V , SITHIRASENAN E ,et al. Flow-based anomaly detection using neural network optimized with GSA algorithm[C]// 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops. 2013: 76-81. |
[15] | WINTER P , HERMANN E , ZEILINGER M . Inductive intrusiondetection in flow-based network data using one-class support vector machines[C]// 2011 4th IFIP International Conference on New Technologies,Mobility and Security. 2011: 1-5. |
[16] | TRUNG P V , HUONG T T , DANG V T ,et al. A multi-criteria-based DDoS-attack prevention solution using software defined networking[C]// 2015 International Conference on Advanced Technologies for Communications (ATC). 2015: 308-313. |
[17] | YUAN X Y , LI C H , LI X . DeepDefense:identifying DDoS attack via deep learning[C]// 2017 IEEE International Conference on Smart Computing (SMARTCOMP). 2017: 1-8. |
[18] | 李传煌, 孙正君, 袁小雍 ,等. 基于深度学习的实时 DDoS 攻击检测[J]. 电信科学, 2017,33(7): 53-65. |
LI C H , SUN Z J , YUAN X Y ,et al. Real-time DDoS attack detection based on deep learning[J]. Telecommunications Science, 2017,33(7): 53-65. | |
[19] | LIU C , SUN W , CHAO W . Convolution neural network for relation extraction[C]// International Conference on Advanced Data Mining and Applications (ADMA 2013). 2013: 231-242. |
[20] | HINTON G E , SRIVASTAVA N , KRIZHEVSKY A ,et al. Improving neural networks by preventing co-adaptation of feature detectors[J]. Computer Science, 2012,3(4): 212-223. |
[21] | SRIVASTAVA N , HINTON G , KRIZHEVSKY A ,et al. Dropout:a simple way to prevent neural networks from overfitting[J]. Journal of Machine Learning Research, 2014,15(1): 1929-1958. |
[1] | Dongyu CHEN, Hua CHEN, Limin FAN, Yifang FU, Jian WANG. Research on test strategy for randomness based on deep learning [J]. Journal on Communications, 2023, 44(6): 23-33. |
[2] | Rongpeng LI, Bingyan WANG, Honggang ZHANG, Zhifeng ZHAO. Design of knowledge enhanced semantic communication receiver [J]. Journal on Communications, 2023, 44(6): 70-76. |
[3] | Shuai MA, Ke PEI, Huayan QI, Hang LI, Wen CAO, Hongmei WANG, Hailiang XIONG, Shiyin LI. Research on geomagnetic indoor high-precision positioning algorithm based on generative model [J]. Journal on Communications, 2023, 44(6): 211-222. |
[4] | Dongbin WANG, Dongzhe WU, Hui ZHI, Kun GUO, Xu ZHANG, Jinqiao SHI, Yu ZHANG, Yueming LU. Preventing flow table overflow against denial of service attack in software defined network [J]. Journal on Communications, 2023, 44(2): 1-11. |
[5] | Zongxuan SHA, Ru HUO, Chuang SUN, Shuo WANG, Tao HUANG. Forwarding efficiency aware traffic scheduling algorithm based on deep reinforcement learning [J]. Journal on Communications, 2022, 43(8): 30-40. |
[6] | Jie YANG, Biao DONG, Xue FU, Yu WANG, Guan GUI. Lightweight decentralized learning-based automatic modulation classification method [J]. Journal on Communications, 2022, 43(7): 134-142. |
[7] | Xiuzhang YANG, Guojun PENG, Zichuan LI, Yangqi LYU, Side LIU, Chenguang LI. Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF [J]. Journal on Communications, 2022, 43(6): 58-70. |
[8] | Binghao YAN, Qinrang LIU, Jianliang SHEN, Xiantuo TANG, Dong LIANG. Fast loop-free path migration strategy in software defined network [J]. Journal on Communications, 2022, 43(5): 24-35. |
[9] | Yong LIAO, Shiyi WANG. CSI feedback algorithm based on RM-Net for massive MIMO systems in high-speed mobile environment [J]. Journal on Communications, 2022, 43(5): 166-176. |
[10] | Yurong LIAO, Haining WANG, Cunbao LIN, Yang LI, Yuqiang FANG, Shuyan NI. Research progress of deep learning-based object detection of optical remote sensing image [J]. Journal on Communications, 2022, 43(5): 190-203. |
[11] | Zenghua ZHAO, Yuefan TONG, Jiayang CUI. Device-independent Wi-Fi fingerprinting indoor localization model based on domain adaptation [J]. Journal on Communications, 2022, 43(4): 143-153. |
[12] | Chuanhuang LI, Yangting CHEN, Jingjing TANG, Jiali LOU, Renhua XIE, Chuntao FANG, Weiming WANG, Chao CHEN. QL-STCT: an intelligent routing convergence method for SDN link failure [J]. Journal on Communications, 2022, 43(2): 131-142. |
[13] | Lixia XIE, Xueou LI, Hongyu YANG, Liang ZHANG, Xiang CHENG. Multi-stage detection method for APT attack based on sample feature reinforcement [J]. Journal on Communications, 2022, 43(12): 66-76. |
[14] | Yong LIAO, Gang CHENG, Yujie LI. CSI feedback algorithm based on deep unfolding for massive MIMO systems [J]. Journal on Communications, 2022, 43(12): 77-88. |
[15] | Xueyuan DUAN, Yu FU, Kun WANG, Bin LI. LDoS attack detection method based on simple statistical features [J]. Journal on Communications, 2022, 43(11): 53-64. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|