DDoS Attack Tracking Using Multi-Round Iterative Viterbi Algorithm in Satellite Internet

被引:0
|
作者
Guo, Wei [1 ,2 ,3 ]
Xu, Jin [4 ]
Pei, Yukui [4 ,5 ]
Yin, Liuguo [4 ]
Feng, Wei [1 ,4 ]
机构
[1] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[2] China Telecom Cybersecur Technol Co Ltd, Beijing, Peoples R China
[3] China Telecom Co Ltd, Operat Ctr Network Secur Prod, Beijing, Peoples R China
[4] Beijing Natl Res Ctr Informat Sci & Technol, Beijing 100084, Peoples R China
[5] Res Inst Tsinghua, Guangzhou 510530, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
DDoS tracking; iterative Viterbi algorithm; satellite Internet; 6G; UAV COMMUNICATIONS; SECURITY; NETWORK;
D O I
10.23919/JCC.ja.2023-0046
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Satellite Internet (SI) provides broadband access as a critical information infrastructure in 6G. However, with the integration of the terrestrial Internet, the influx of massive terrestrial traffic will bring significant threats to SI, among which DDoS attack will intensify the erosion of limited bandwidth resources. Therefore, this paper proposes a DDoS attack tracking scheme using a multi-round iterative Viterbi algorithm to achieve high-accuracy attack path reconstruction and fast internal source locking, protecting SI from the source. Firstly, to reduce communication overhead, the logarithmic representation of the traffic volume is added to the digests after modeling SI, generating the lightweight deviation degree to construct the observation probability matrix for the Viterbi algorithm. Secondly, the path node matrix is expanded to multi-index matrices in the Viterbi algorithm to store index information for all probability values, deriving the path with non-repeatability and maximum probability. Finally, multiple rounds of iterative Viterbi tracking are performed locally to track DDoS attack based on trimming tracking results. Simulation and experimental results show that the scheme can achieve 96.8% tracking accuracy of external and internal DDoS attack at 2.5 seconds, with the communication overhead at 268KB/s, effectively protecting the limited bandwidth resources of SI.
引用
收藏
页码:148 / 163
页数:16
相关论文
共 50 条
  • [31] DDoS Attack Detection System using Neural Network on Internet of Things
    Adi, Lulus Wahyu Prasetya
    Mandala, Satria
    Nugraha, Yudhistira
    2022 INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ITS APPLICATIONS (ICODSA), 2022, : 41 - 46
  • [32] DDoS attack detection in Internet of Things using recurrent neural network
    Yousuf, Omerah
    Mir, Roohie Naaz
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 101
  • [33] A Worst-Case Optimal Multi-Round Algorithm for Parallel Computation of Conjunctive Queries
    Ketsman, Bas
    Suciu, Dan
    PODS'17: PROCEEDINGS OF THE 36TH ACM SIGMOD-SIGACT-SIGAI SYMPOSIUM ON PRINCIPLES OF DATABASE SYSTEMS, 2017, : 417 - 428
  • [34] A Secure and Efficient Framework for Multi-Round Data Trading Over the Internet of Artificially Intelligent Things
    Zheng X.
    Zhang L.
    Hui B.
    Tian L.
    Cai Z.
    IEEE Internet of Things Magazine, 2022, 5 (01): : 119 - 124
  • [35] Internet of Things Enabled DDoS Attack Detection Using Pigeon Inspired Optimization Algorithm with Deep Learning Approach
    Alghamdi, Turki Ali
    Alotaibi, Saud S.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (03): : 4047 - 4064
  • [36] Multi-dimensional multi-round minimum cost consensus models with iterative mechanisms involving reward and punishment measures
    Guo, Weiwei
    Wang, Haitao
    Zhang, Wei-Guo
    Gong, Zaiwu
    Xu, Yanxin
    Slowinski, Roman
    KNOWLEDGE-BASED SYSTEMS, 2024, 293
  • [37] DDoS Attack Detection Algorithm Using IP Address Features
    Cheng, Jieren
    Yin, Jianping
    Liu, Yun
    Cai, Zhiping
    Li, Min
    FRONTIERS IN ALGORITHMICS, PROCEEDINGS, 2009, 5598 : 207 - 215
  • [38] Detection of DDoS DNS Amplification Attack Using Classification Algorithm
    Meitei, Irom Lalit
    Singh, Khundrakpam Johnson
    De, Tanmay
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [39] DDoS Attack Detection Using Greedy Algorithm and Frequency Modulation
    Ates, Cagatay
    Ozdel, Suleyman
    Yildirim, Metehan
    Anarim, Emin
    2019 27TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2019,
  • [40] A biased random-key genetic algorithm for scheduling heterogeneous multi-round systems
    Brandao, Julliany S.
    Noronha, Thiago F.
    Resende, Mauricio G. C.
    Ribeiro, Celso C.
    INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH, 2017, 24 (05) : 1061 - 1077