A DDoS (Distributed Denial of Service) attack makes use of a botnet to launch attacks and cause node congestion of wireless sensor networks, which is a common and serious threat. Due to the various kinds of features required in a Peer-to-Peer (P2P) botnet for DDoS attack detection via current machine learning methods and the failure to effectively detect encrypted botnets, this paper extracts the data packet size and the symmetric intervals in flow according to the concept of graphic symmetry. Combined with flow information entropy and session features, the frequency domain features can be sorted so as to obtain features with better correlations, which solves the problem of multiple types of features required for detection. Information entropy corresponding to the flow size can distinguish an encrypted botnet. This method is implemented through machine learning techniques. Experimental results show that the proposed method can detect the P2P botnet for DDoS attack and the detection accuracy is higher than that of traditional feature detection.
To improve the low acceptance ratio and revenue to cost ratio caused by the poor match between the virtual nodes and the physical nodes in the existing virtual network embedding (VNE) algorithms, we established a multi-objective optimization integer linear programming model for the VNE problem, and proposed a novel two-stage virtual network embedding algorithm based on topology potential (VNE-TP). In the node embedding stage, the field theory once used for data clustering was introduced and a node embedding function designed to find the optimal physical node. In the link embedding stage, both the available bandwidth and hops of the candidate paths were considered, and a path embedding function designed to find the optimal path. Extensive simulation results show that the proposed algorithm outperforms other existing algorithms in terms of acceptance ratio and revenue to cost ratio.
Botnets are a common and serious threat to the Internet. The search for the infected nodes of a P2P botnet is affected by the number of commonly connected nodes, with a lower detection accuracy rate for cases with fewer commonly connected nodes. However, this paper calculates the Mahalanobis distance—which can express correlations between data—between indirectly connected nodes through traffic with commonly connected nodes, and establishes a relationship evaluation model among nodes. An iterative algorithm is used to obtain the correlation coefficient between the nodes, and the threshold is set to detect P2P botnets. The experimental results show that this method can effectively detect P2P botnets with an accuracy of >85% when the correlation coefficient is high, even in cases with fewer commonly connected nodes.
A new method for generating frequency-octupling millimeter-wave (mm-wave) vector signals in optical fields via a Sagnac loop is proposed. In this scheme, two orthogonally polarized fourth order sidebands can be obtained through an integrated dual-polarization quadrature phase shift keying (DP-QPSK) modulator. The two optical sidebands are sent into an I/Q modulator-based Sagnac loop. The I/Q modulator is modulated by a 16QAM baseband signal. In the Sagnac loop, one of the sidebands is modulated by the baseband vector signal along one direction, and the other sideband is unmodulated along the opposite direction because the I/Q modulator has the traveling-wave nature. Thanks to this modulation property and the symmetrical structure of the Sagnac loop, a frequency-octupling mm-wave vector signal that is free from interband beating and fiber chromatic dispersion interference can be generated by the photodetector (PD). After simulating a 20 km single-mode fiber (SMF) transmission, the generated frequency-octupling vector signal was good in function.
Abstract-The Barabási-Albert (BA) model is a famous complex network model that generates scale-free networks. Wireless sensor networks (WSNs) had been thought to be approximately scale-free through lots of empirical research. Based on the BA model, we propose an evolution model for WSNs. According to actual influence factors such as the remainder energy of each sensor and physical link capability of each sensor, our evolution model constructs WSNs by using a preferential attachment mechanism. Through simulation and analysis, we can prove that our evolution model would make the total energy consumption of the WSNs more efficient and have a superior random node error tolerance.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.