2020 International Conference on Computer Communication and Network Security (CCNS) 2020
DOI: 10.1109/ccns50731.2020.00019
|View full text |Cite
|
Sign up to set email alerts
|

A Small Sample DDoS Attack Detection Method Based on Deep Transfer Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…With the in-depth development of deep learning, many researchers also apply new architectures to optimize DDoS detection performance. In 2020, He et al [ 10 ] employed transfer learning for small-sample DDoS detection. They also define the transfer ability to evaluate different networks and select the best network structure and parameters.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…With the in-depth development of deep learning, many researchers also apply new architectures to optimize DDoS detection performance. In 2020, He et al [ 10 ] employed transfer learning for small-sample DDoS detection. They also define the transfer ability to evaluate different networks and select the best network structure and parameters.…”
Section: Related Workmentioning
confidence: 99%
“…Calculate the total time T and average time T that fall into period t i ; (8) num num + 1; (9) P.append(num); (10) extract features on t i , such as duration, interval, and bits; (11) save as 12) for (i 1; i ≤ m; i + +) do (13) for (j 1; j ≤ p[i − 1]; j + +)do (14) if graph G m does not contain node N src or N des of C i j then (15) add edge N src , N des to graph G m ; (16) if graph G m contains the edge between N src and N des then (17) add extracted time attributes edge i num to the edge N src , N des ; ( 18) else (19) create an edge between N src and N des ; (20) add extracted time attributes edge i num to the edge N src , N des ; (21) return G ALGORITHM 1: Construction of dynamic DDoS topology graph based on time series. used for error metrics cannot be represented by consecutive integers with uneven differences.…”
Section: 3mentioning
confidence: 99%
See 1 more Smart Citation
“…e authors proposed a minimal-degree DoS assault revealing method centred on the Pearson relationship, which uses the Pearson coefficient of correlation based on the Hilbert spectrum net congestion, to characterize network traffic information, and compares this information with a threshold to detect low-rate attacks against TCP [3]. Author analyzed the sequence similarity between the minimal-degree DDoS assault pulses at the victim end from the perspective of sequence matching, used the Smith-Waterman algorithm, and designed a doublethreshold rule to detect TCP-based low-rate attacks [4]. e authors proposed a method based on network self-similarity to analyze the impact of low-rate attacks on traffic selfsimilarity and used H-index combined with thresholds to identify attacks and legitimate traffic [5].…”
Section: Related Workmentioning
confidence: 99%
“…Substations, as a crucial component of the smart grid, play an irreplaceable role in power generation, transmission, and distribution. Therefore, status monitoring and fault diagnosis of substations is a crucial objective of the smart grid [1,2].…”
Section: Introductionmentioning
confidence: 99%