2020
DOI: 10.1002/cpe.5783
|View full text |Cite
|
Sign up to set email alerts
|

DDoS detection based on graph structure features and non‐negative matrix factorization

Abstract: Distributed denial of service (DDoS) attacks are the most common and harmful attack in the field of network security, the purpose of this paper is to predict the occurrence of DDoS attacks quickly, accurately and effectively. In this paper, the characteristics of DDoS attacks are analyzed in detail, graph model is used to express the structural characteristics of traffic data between the victims and bots, at the same time, considering data characteristics of traffic itself, 11 characteristics are selected at l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…us, a series of arrays with large expectation values are used. e sum of the expectation value q is larger than 90% with respect to the analysis of some references [5], [23][24][25]. In this example, the expectation values are 96.42% and 3.57%, respectively.…”
Section: Dimensionality Reduction In Thementioning
confidence: 74%
See 2 more Smart Citations
“…us, a series of arrays with large expectation values are used. e sum of the expectation value q is larger than 90% with respect to the analysis of some references [5], [23][24][25]. In this example, the expectation values are 96.42% and 3.57%, respectively.…”
Section: Dimensionality Reduction In Thementioning
confidence: 74%
“…e destination vertices receive different packets, and the processing time is also different. Furthermore, the interval time of normal traffic is affected by noise, network bandwidth, receiving window size, sending window size, etc., which shows a significant difference from DDoS attacks [5]. In addition, the interval time of normal traffic is limited by network bandwidth, noise, size of sending window, and other factors, which is significantly different from DDoS attacks.…”
Section: Standard Deviation Of Flow Interval Timementioning
confidence: 96%
See 1 more Smart Citation