计算机科学 ›› 2018, Vol. 45 ›› Issue (12): 123-129.doi: 10.11896/j.issn.1002-137X.2018.12.019

• 信息安全 • 上一篇    下一篇

基于智能蜂群算法的DDoS攻击检测系统

余学山1, 韩德志1, 杜振鑫1,2   

  1. (上海海事大学信息工程学院 上海201306)1
    (韩山师范学院计算机与信息工程学院 广东 潮州521041)2
  • 收稿日期:2017-11-15 出版日期:2018-12-15 发布日期:2019-02-25
  • 作者简介:余学山(1993-),男,硕士,主要研究方向为机器学习与云计算,E-mail:xueshan0529@163.com;韩德志(1966-),男,博士,教授,CCF高级会员,主要研究方向为云计算、云存储与安全技术、大数据应用,E-mail:dezhihan88@sina.com(通信作者);杜振鑫(1976-),男,博士,讲师,主要研究方向为机器学习、数据挖掘与云计算。
  • 基金资助:
    本文受国家自然科学基金(61373028,61672338)资助。

DDoS Attack Detection System Based on Intelligent Bee Colony Algorithm

YU Xue-shan1, HAN De-zhi1, DU Zheng-xin1,2   

  1. (College of Information Engineering,Shanghai Maritime University,Shanghai 201306,China)1
    (School of Computer Information Engineering,Hanshan Normal University,Chaozhou,Guangdong 521041,China)2
  • Received:2017-11-15 Online:2018-12-15 Published:2019-02-25

摘要: 随着大数据应用的普及,DDoS攻击日益严重并已成为主要的网络安全问题。针对大数据环境下的DDoS攻击检测问题,设计了一种融合聚类和智能蜂群算法(DFSABC_elite)的DDoS攻击检测系统。该系统将聚类算法与智能蜂群算法相结合来进行数据流分类,用流量特征分布熵与广义似然比较判别因子来检测DDoS攻击数据流的特征,从而实现了DDoS攻击数据流的高效检测。实验结果显示,该系统在类内紧密度、类间分离度、聚类准确率、算法耗时和DDoS检测准确率方面明显优于基于并行化K-means的普通蜂群算法和基于并行化K-means算法的DDoS检测方法。

关键词: DDoS攻击, 广义似然比较, 聚类算法, 流量特征分布熵, 智能蜂群算法

Abstract: With the popularity of the applications of big data,DDoS attacks become increasingly serious and have been the main network security issues.This paper designed a DDoS attack intrusion detection system based on clustering and intelligent bee colony algorithm (DFSABC_elite) for DDoS attack detection in environment of big data.The system combines the clustering algorithm and the intelligent bee colony algorithm to classify DDoS attack data flow,and uses the traffic feature distribution entropy and the generalized likelihood comparison distinguishing factor together to detect the characteristics of DDoS attack data stream,thus achieving the efficient detection of DDoS attack data flow.Experimental results show that this system is obviously superior to the ordinary bee colony algorithm based on parallelization K-means and the DDOS detection algorithm based on parallelization K-means in terms of intra-class compactness,inter-class separation,clustering accuracy,consumed time and DDoS detection accuracy.

Key words: Clustering algorithm, DDoS attack, Generalized likelihood comparison, Intelligent bee colony algorithm, Traffic feature distribution entropy

中图分类号: 

  • TP309.2
[1]SOPHIA G A,GANDHI M.Stealthy DDoS detecting mecha-nism for cloud resilience system[C]∥2017 International Confe-rence on Information Communication and Embedded Systems (ICICES).IEEE,2017:1-5.
[2]MODI C,PATEL D,BORISANIYA B,et al.A survey on security issues and solutions at different layers of Cloud computing[J].The Journal of Supercomputing,2013,63(2):561-592.
[3]HAN D Z,BI K,JIN J,et al.A DDoS Attack Detection System Based on Spark Framework[J].Computer Science & Information Systems,2017,14:28.
[4]GUELLIL I,AZOUAOU F.Arabic Dialect Identification with an Unsupervised Learning (Based on a Lexicon).Application Case:ALGERIAN Dialect[C]∥Computational Science and Engineering.IEEE,2017:724-731.
[5]SAIDA I B,KAMEL N,OMAR B.A New Hybrid Algorithm for Document Clustering Based on Cuckoo Search and K-means[M]∥Recent Advances on Soft Computing and Data Mining.Springer International Publishing,2014:59-68.
[6]NIU B,DUAN Q,LIU J,et al.A population-based clusteringtechnique using particle swarm optimization and k-means[J].Natural Computing,2016,16(1):1-15.
[7]TEODOROVIC' D,ORCO M D.Advanced OR and AI Methods inTransportation BEE Colony Optimization- A Cooperative Learning Approach to Complex Transportation PRoblems∥Proceedings of the 16th Mini-EURO Conference and 10th Meeting of EWGT.2008.
[8]KARABOGA D,BASTURK B.On the performance of artificial bee colony (ABC) algorithm[J].Applied Soft Computing,2008,8(1):687-697.
[9]ZHAO W,MA H,HE Q.Parallel k-means clustering based on mapreduce[C]∥IEEE International Conference on Cloud Computing.Springer Berlin Heidelberg,2009:674-679.
[10]CUI L,LI G,LIN Q,et al.A novel artificial bee colony algorithm with depth-first search framework and elite-guided search equation.Information Sciences,2016,367-368:1012-1044.
[11]PRÍNCIPE J C,MIIKKULAINEN R.Advances in self-organi-zing maps[C]∥Advances in Self-Organizing Maps:7th International Workshop,WSOM 2009.Springer,2009.
[12]DU B,SUN Y,CAI S,et al.Object Tracking in Satellite Videos by Fusing the Kernel Correlation Filter and the Three-Frame-Difference Algorithm[J].IEEE Geoscience & Remote Sensing Letters,2017,PP(99):1-5.
[13]CAO Y C,CAI Z Q,SHAO Y B.An improved artificial bee colony clustering algorithm based on K-means [J].Journal of Computer Applications,2014,34(1):204-207.(in Chinese)
曹永春,蔡正琦,邵亚斌.基于 K-means的改进人工蜂群聚类算法[J].计算机应用,2014,34(1):204-207.
[14]YANG X R,HAN B,SUN Z G,et al.SDN-based DDoS Attack Detection with Cross-Plane Collaboration and Lightweight Flow Monitoring[C]∥Global Communications Conference.2017.
[15]YAN Y,ZHANG S,TANG J,et al.Understanding characteristics in multivariate traffic flow time series from complex network structure[J].Physica A:Statistical Mechanics & Its Applications,2017,477.
[16]LAKHINA A,CROVELLA M,DIOT C.Mininganomalies using traffic feature distributions∥Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications.ACM,2005:217-228.
[17]PENG T,LECKIE C,RAMAMOHANARAO K.Proactivelydetecting distributed denial of service attacks using source IP address monitoring[C]∥International Conference on Research in Networking.Springer Berlin Heidelberg,2004:771-782.
[18]SUN Q D,ZHANG D Y,GAO P.Distributed Denial of Service Attack Detection Based on Time Series Analysis.Chinese Journal of Computers,2005,28(5):767-773.(in Chinese)
孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测.计算机学报,2005,28(5):767-773.
[19]XU Z,ZHU S,FU B,et al.Motion coherence based abnormalbehavior detection[C]∥Control and Decision Conference.IEEE,2017:214-218.
[20]HAN D Z,BI K,XIE B L,et al.An Anomaly Detection on the Application-Layer -Based QoS in the Cloud Storage System[J].Computer Science and Information Systems,2016,13(2):659-676.
[21]YUAN Y,WANG D,WANG Q.Anomaly Detection in TrafficScenes via Spatial-Aware Motion Reconstruction[J].IEEE Transactions on Intelligent Transportation Systems,2017,18(5):1198-1209.
[22]CHANG R K C.Defending against flooding-based distributeddenial-of-service attacks:a tutorial[J].IEEE Communications Magazine,2002,40(10):42-51.
[23]LEMON J.Resisting SYN Flood DoS Attacks with a SYNCache[C]∥Bsdcon Conference.2002.
[24]WU J S,ZHANG W P,MA Y.The Data Analysis of KDDCUP99 Data Set [J].Computer Applications and Software,2014 (11):321-325.(in Chinese)
吴建胜,张文鹏,马垣.KDDCUP99数据集的数据分析研究[J].计算机应用与软件,2014(11):321-325.
[25]AHMED H,ISMAIL M A,HYDER M F,et al.PerformanceComparison of Spark Clusters Configured Conventionally and a Cloud Service.Procedia Computer Science,2016,82:99-106.
[26]ZAHARIA M,DAS T,LI H,et al.Discretized Streams:An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters[C]∥Usenix Conference on Hot Topics in Cloud Computing.USENIX Association,2012.
[1] 柴慧敏, 张勇, 方敏.
基于特征相似度聚类的空中目标分群方法
Aerial Target Grouping Method Based on Feature Similarity Clustering
计算机科学, 2022, 49(9): 70-75. https://doi.org/10.11896/jsjkx.210800203
[2] 张亚迪, 孙悦, 刘锋, 朱二周.
结合密度参数与中心替换的改进K-means算法及新聚类有效性指标研究
Study on Density Parameter and Center-Replacement Combined K-means and New Clustering Validity Index
计算机科学, 2022, 49(1): 121-132. https://doi.org/10.11896/jsjkx.201100148
[3] 李杉, 许新征.
基于双角度并行剪枝的VGG16优化方法
Parallel Pruning from Two Aspects for VGG16 Optimization
计算机科学, 2021, 48(6): 227-233. https://doi.org/10.11896/jsjkx.200800016
[4] 汤鑫瑶, 张正军, 储杰, 严涛.
基于自然最近邻的密度峰值聚类算法
Density Peaks Clustering Algorithm Based on Natural Nearest Neighbor
计算机科学, 2021, 48(3): 151-157. https://doi.org/10.11896/jsjkx.200100112
[5] 王茂光, 杨行.
一种基于AP-Entropy选择集成的风控模型和算法
Risk Control Model and Algorithm Based on AP-Entropy Selection Ensemble
计算机科学, 2021, 48(11A): 71-76. https://doi.org/10.11896/jsjkx.210200110
[6] 王卫东, 徐金慧, 张志峰, 杨习贝.
基于密度峰值聚类的高斯混合模型算法
Gaussian Mixture Models Algorithm Based on Density Peaks Clustering
计算机科学, 2021, 48(10): 191-196. https://doi.org/10.11896/jsjkx.200800191
[7] 张煜, 陆亿红, 黄德才.
基于密度峰值的加权犹豫模糊聚类算法
Weighted Hesitant Fuzzy Clustering Based on Density Peaks
计算机科学, 2021, 48(1): 145-151. https://doi.org/10.11896/jsjkx.200400043
[8] 徐守坤, 倪楚涵, 吉晨晨, 李宁.
基于YOLOv3的施工场景安全帽佩戴的图像描述
Image Caption of Safety Helmets Wearing in Construction Scene Based on YOLOv3
计算机科学, 2020, 47(8): 233-240. https://doi.org/10.11896/jsjkx.190600109
[9] 邓定胜.
一种改进的DBSCAN算法在Spark平台上的应用
Application of Improved DBSCAN Algorithm on Spark Platform
计算机科学, 2020, 47(11A): 425-429. https://doi.org/10.11896/jsjkx.190700071
[10] 田献珍, 孙立强, 田振中.
基于蚁群算法的图像重建
Image Reconstruction Based on Ant Colony Algorithm
计算机科学, 2020, 47(11A): 231-235. https://doi.org/10.11896/jsjkx.191000128
[11] 张建新, 刘弘, 李焱.
一种面向人群疏散的高效分组方法
Efficient Grouping Method for Crowd Evacuation
计算机科学, 2019, 46(6): 231-238. https://doi.org/10.11896/j.issn.1002-137X.2019.06.035
[12] 胡闯, 杨庚, 白云璐.
面向差分隐私保护的聚类算法
Clustering Algorithm in Differential Privacy Preserving
计算机科学, 2019, 46(2): 120-126. https://doi.org/10.11896/j.issn.1002-137X.2019.02.019
[13] 张天柱, 邹承明.
使用模糊聚类的胶囊网络在图像分类上的研究
Study on Image Classification of Capsule Network Using Fuzzy Clustering
计算机科学, 2019, 46(12): 279-285. https://doi.org/10.11896/jsjkx.190200315
[14] 陈子豪, 李强.
基于K-medoids的改进PBFT共识机制
Improved PBFT Consensus Mechanism Based on K-medoids
计算机科学, 2019, 46(12): 101-107. https://doi.org/10.11896/jsjkx.181002014
[15] 陈春涛, 陈优广.
基于影响空间的稳健密度峰值聚类算法
Influence Space Based Robust Fast Search and Density Peak Clustering Algorithm
计算机科学, 2019, 46(11): 216-221. https://doi.org/10.11896/jsjkx.181001846
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!