2018
DOI: 10.1155/2018/5198685
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning

Abstract: Correspondence should be addressed to Chen Zhang; 314848554@qq.com.Distributed denial of service (DDoS) attacks have caused huge economic losses to society. They have become one of the main threats to Internet security. Most of the current detection methods based on a single feature and fixed model parameters cannot effectively detect early DDoS attacks in cloud and big data environment. In this paper, an adaptive DDoS attack detection method (ADADM) based on multiple kernel learning (MKL) is proposed. Based o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 45 publications
0
12
0
Order By: Relevance
“…Second, the next is setting the port number on the network that is allowed to communicate using the TCP protocol and receiving TCP packets that originate from that port number. The port numbers that allowed in this research are 20,21,22,25,53,80,110,143,443,465,587,993 and 995. For this reason, the port numbers are entered in the TCP_IN line (TCP_IN = "20, 21,22,25,53, 80, 110,143,443,465,587,993,995 ").…”
Section: Testing and Results Using Csf With Spi Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Second, the next is setting the port number on the network that is allowed to communicate using the TCP protocol and receiving TCP packets that originate from that port number. The port numbers that allowed in this research are 20,21,22,25,53,80,110,143,443,465,587,993 and 995. For this reason, the port numbers are entered in the TCP_IN line (TCP_IN = "20, 21,22,25,53, 80, 110,143,443,465,587,993,995 ").…”
Section: Testing and Results Using Csf With Spi Methodsmentioning
confidence: 99%
“…As for receiving TCP packets from allowed port numbers, this is done via the TCP_OUT line. In this research, the number of ports allowed for sending TCP packets is 20,21,22,25,53,80,110,113,443,587,993,995, so the setting is TCP_OUT="20, 21,22,25,53,80,110,113,443,587,993,995". The same is done for sending and receiving UDP packets for allowed port numbers.…”
Section: Testing and Results Using Csf With Spi Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…An adaptive DDoS attack detection method based on multiple kernel learning is proposed in [15]. A powerful feature extraction algorithm is used to extract five features from the traffic to detect attack traffic.…”
Section: A Thresholding Approachmentioning
confidence: 99%
“…Moreover, a hyper parameter selection method was proposed by Siqi W et al, [12] for self-adaptive data shifting. And a change-point DDoS attack detection method based on half interaction anomaly degree was presented [13]. Recently, an abnormal network flow based DDoS detection method was presented [14], which showed a better performance among other existing methods.…”
mentioning
confidence: 99%