DDoS Attack Tracking Using Multi-Round Iterative Viterbi Algorithm in Satellite Internet

被引:0
|
作者
Guo, Wei [1 ,2 ,3 ]
Xu, Jin [4 ]
Pei, Yukui [4 ,5 ]
Yin, Liuguo [4 ]
Feng, Wei [1 ,4 ]
机构
[1] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[2] China Telecom Cybersecur Technol Co Ltd, Beijing, Peoples R China
[3] China Telecom Co Ltd, Operat Ctr Network Secur Prod, Beijing, Peoples R China
[4] Beijing Natl Res Ctr Informat Sci & Technol, Beijing 100084, Peoples R China
[5] Res Inst Tsinghua, Guangzhou 510530, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
DDoS tracking; iterative Viterbi algorithm; satellite Internet; 6G; UAV COMMUNICATIONS; SECURITY; NETWORK;
D O I
10.23919/JCC.ja.2023-0046
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Satellite Internet (SI) provides broadband access as a critical information infrastructure in 6G. However, with the integration of the terrestrial Internet, the influx of massive terrestrial traffic will bring significant threats to SI, among which DDoS attack will intensify the erosion of limited bandwidth resources. Therefore, this paper proposes a DDoS attack tracking scheme using a multi-round iterative Viterbi algorithm to achieve high-accuracy attack path reconstruction and fast internal source locking, protecting SI from the source. Firstly, to reduce communication overhead, the logarithmic representation of the traffic volume is added to the digests after modeling SI, generating the lightweight deviation degree to construct the observation probability matrix for the Viterbi algorithm. Secondly, the path node matrix is expanded to multi-index matrices in the Viterbi algorithm to store index information for all probability values, deriving the path with non-repeatability and maximum probability. Finally, multiple rounds of iterative Viterbi tracking are performed locally to track DDoS attack based on trimming tracking results. Simulation and experimental results show that the scheme can achieve 96.8% tracking accuracy of external and internal DDoS attack at 2.5 seconds, with the communication overhead at 268KB/s, effectively protecting the limited bandwidth resources of SI.
引用
收藏
页码:148 / 163
页数:16
相关论文
共 50 条
  • [21] Improved Data Fusion for Multi-Sensor Tracking using a Reinforced Viterbi Algorithm
    Biswas, Rajarshi
    Doshi, Akash S.
    Bhatta, Akankshya
    Pillai, Sibi Raj B.
    2019 25TH NATIONAL CONFERENCE ON COMMUNICATIONS (NCC), 2019,
  • [22] DDoS Attack Detection Using Matching Pursuit Algorithm
    Erhan, Derya
    Anarim, Emin
    Kurt, Gunes Karabulut
    2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 1081 - 1084
  • [23] A parallel transferable uniform multi-round algorithm in heterogeneous distributed computing environment
    Yamamoto, Hiroshi
    Tsuru, Masato
    Oie, Yuji
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 51 - 60
  • [24] A multi-round linear adaptive algorithm for load balance in grid resource scheduling
    Zhuang, Weiran
    Liu, Dongmei
    Ji, Yuefeng
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 752 - 756
  • [25] Multi-round Dialogue State Tracking by Object-Entity Alignment in Visual Dialog
    Pang, Wei
    ARTIFICIAL INTELLIGENCE, CICAI 2023, PT I, 2024, 14473 : 541 - 553
  • [26] PERFORMANCE OF ADAPTIVE EQUALIZER USING ITERATIVE APPLICATION OF VITERBI ALGORITHM
    MURATA, H
    YOSHIDA, S
    TAKEUCHI, T
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART I-COMMUNICATIONS, 1994, 77 (04): : 103 - 110
  • [27] Performance of adaptive equalizer using iterative application of Viterbi algorithm
    Murata, Hidekazu
    Yoshida, Susumu
    Takeuchi, Tsutomu
    Electronics and Communications in Japan, Part I: Communications (English translation of Denshi Tsushin Gakkai Ronbunshi), 1994, 77 (04): : 103 - 110
  • [28] An unconditionally secure multi-round revocation scheme using secret sharing
    Yang, M
    PROCEEDINGS OF THE THIRD IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND COMPUTER NETWORKS, 2005, : 31 - 37
  • [29] An unconditionally secure multi-round revocation scheme using secret sharing
    Yang, Ming
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 630 - 635
  • [30] Multi-round decentralized dataset distillation with federated learning for Low Earth Orbit satellite communication
    Xu, Jianlong
    Jin, Mengqing
    Xiao, Jinze
    Lin, Dianming
    Liu, Yuelong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 164