A DDOS Intrusion Detection Method Based On Data Mining

被引:0
|
作者
Tian Jun-feng [1 ]
Pang Tao [1 ]
Du Rui-zhong [1 ]
机构
[1] HeBei Univ, Coll Math & Comp Sci, Baoding 071002, Peoples R China
关键词
DdoS; detection; attack; traffic analysis; cluster algorithm;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DDoS attacks has become a serious threat against network security. In this paper we propose a novel method for detection of DDoS attacks by studying its architecture and the change of network traffic in the process of attack. And software model for the method is designed. In addition, Key issues of the choice of parameter and the cluster analysis of the sample is resolved. The simulation test result shows that the attack can be detected accurately and police error rate is very low. This method is simpler and easier to achieve than the traditional detection method.
引用
收藏
页码:42 / 46
页数:5
相关论文
共 50 条
  • [31] Design of Intrusion Detection Model Based on Data Mining Technology
    Li Yin-huan
    [J]. 2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 571 - 574
  • [32] An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques
    Haque, Mohd Junedul
    Magld, Khalid W.
    Hundewale, Nisar
    [J]. 2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 13 - 17
  • [33] Adaptive intrusion detection with data mining
    Hossain, M
    Bridges, SM
    Vaughn, RB
    [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 3097 - 3103
  • [34] A Study of Intrusion Detection in Data Mining
    Reddy, E. Kesavalu
    Reddy, V. Naveen
    Rajulu, P. Govinda
    [J]. WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL III, 2011, : 1889 - 1894
  • [35] Real time data mining-based intrusion detection
    Lee, W
    Stolf, SJ
    Chan, PK
    Eskin, E
    Fan, W
    Miller, M
    Hershkop, S
    Zhang, JX
    [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 89 - 100
  • [36] Research and Design on Intrusion Detection System Based on Data Mining
    Song, Guoqin
    Guo, Yuanhui
    Qiu, Qianxi
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 188 - 194
  • [37] A novel adaptive intrusion detection system based on data mining
    Yu, ZX
    Chen, JR
    Zhu, TQ
    [J]. PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 2390 - 2395
  • [38] Intrusion Detection System Based on data mining for Host Log
    Zhu, Ming
    Huang, ZiLi
    [J]. 2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 1742 - 1746
  • [39] Algorithm of Intrusion Detection Based on Data Mining and Its Implementation
    孙海彬
    徐良贤
    陈彦华
    [J]. Journal of Donghua University(English Edition), 2004, (05) : 88 - 92
  • [40] Research on a Network Intrusion Detection System Based on Data Mining
    Fang, Zhongjin
    Zhou, Shu
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (ICTMF 2012), 2013, 38 : 204 - 209