A DDOS Intrusion Detection Method Based On Data Mining

被引:0
|
作者
Tian Jun-feng [1 ]
Pang Tao [1 ]
Du Rui-zhong [1 ]
机构
[1] HeBei Univ, Coll Math & Comp Sci, Baoding 071002, Peoples R China
关键词
DdoS; detection; attack; traffic analysis; cluster algorithm;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DDoS attacks has become a serious threat against network security. In this paper we propose a novel method for detection of DDoS attacks by studying its architecture and the change of network traffic in the process of attack. And software model for the method is designed. In addition, Key issues of the choice of parameter and the cluster analysis of the sample is resolved. The simulation test result shows that the attack can be detected accurately and police error rate is very low. This method is simpler and easier to achieve than the traditional detection method.
引用
收藏
页码:42 / 46
页数:5
相关论文
共 50 条
  • [1] The WSN intrusion detection method based on deep data mining
    Zhang, Yiwei
    [J]. Journal of Cyber Security Technology, 2023, 7 (03) : 115 - 133
  • [2] Intrusion Detection Based on Data Mining
    Oreku, George S.
    Mtenzi, Fredrick J.
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 696 - 701
  • [3] Intrusion detection based on data mining
    Yin, Jian
    Mei, Fang
    Zhang, Gang
    [J]. COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 724 - 729
  • [4] Data mining based network intrusion detection method in the environment of IoT
    Wu, Guihua
    Xie, Lijing
    [J]. INTERNET TECHNOLOGY LETTERS, 2023,
  • [5] Early DDoS Detection Based on Data Mining Techniques
    Xylogiannopoulos, Konstantinos
    Karampelas, Panagiotis
    Alhajj, Reda
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 190 - 199
  • [6] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    [J]. Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [7] Intrusion Detection Models Based on Data Mining
    Mao, Guojun
    Wu, Xindong
    Jiang, Xuxian
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01): : 30 - 38
  • [8] A data mining based intrusion detection model
    Sun, JH
    Jin, H
    Chen, H
    Han, ZF
    Zou, DQ
    [J]. INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 677 - 684
  • [9] Intrusion detection system based on data mining
    Zhan Jinhua
    [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [10] Research on intrusion detection based on data mining
    Tong, Xiaojun
    Cui, Minggen
    Wang, Jie
    [J]. PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, PROCEEDINGS, 2007, : 444 - 447