Proceedings of the 2016 3rd International Conference on Materials Engineering, Manufacturing Technology and Control 2016
DOI: 10.2991/icmemtc-16.2016.133
|View full text |Cite
|
Sign up to set email alerts
|

Detecting DDoS attack based on PSO Clustering algorithm

Abstract: Abstract. First, this article analyzes the Application layer Distributed Denial of Service(DDoS)'s attack principle and characteristic. According to the difference between normal users' browsing patterns and abnormal ones, user sessions are extracted from the web logs of normal users and similarities between different sessions are calculated .Because traditional K-mean Clustering algorithm is easy to fail into local optimal, the Particle Swarm Optimization K-mean Clustering algorithm is used to generate a dete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…This approach refines the K initial cluster centers in a data set by each case that will enter the nearest cluster center after first identifying the initial cluster centres. To identify DDoS attacks of unknown sessions, Hao et al [43] developed a detection algorithm. Suggested a method for identifying DDoS attacks using the clustering algorithm of K-means, and they attained a 97.83% accuracy rate [33].…”
Section: K-mean Clusteringmentioning
confidence: 99%
“…This approach refines the K initial cluster centers in a data set by each case that will enter the nearest cluster center after first identifying the initial cluster centres. To identify DDoS attacks of unknown sessions, Hao et al [43] developed a detection algorithm. Suggested a method for identifying DDoS attacks using the clustering algorithm of K-means, and they attained a 97.83% accuracy rate [33].…”
Section: K-mean Clusteringmentioning
confidence: 99%
“…In Hao et al's study [36] for achieving pattern recognition on weblog data for differentiating the normal and abnormal or malicious data, the user sessions are extracted from the log record. k-means clustering techniques are applied with a hybrid form of particle swarm optimization to generate an efficient attack detection model.…”
Section: Particle Swarm Optimizationmentioning
confidence: 99%
“…Hao et al [49] proposed security against denial of service attack by using a cross-layer approach as the best solution. e cross-layer approach was the combined form of device-driver packet filter (cuckoo-based filter) and remotely firewall.…”
Section: Cuckoo Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, we can classify normal and abnormal network behaviour according to the results of cluster. Literature [10] is established in the different between the normal user's browsing mode and the abnormal user's browsing mode, extracts the user sessions from the normal user's network log. This algorithm uses the particle swarm optimisation K‐means clustering algorithm to generate a detection model to detect if the user behaviour is abnormal or not.…”
Section: Related Workmentioning
confidence: 99%