计算机科学 ›› 2018, Vol. 45 ›› Issue (12): 123-129.doi: 10.11896/j.issn.1002-137X.2018.12.019
余学山1, 韩德志1, 杜振鑫1,2
YU Xue-shan1, HAN De-zhi1, DU Zheng-xin1,2
摘要: 随着大数据应用的普及,DDoS攻击日益严重并已成为主要的网络安全问题。针对大数据环境下的DDoS攻击检测问题,设计了一种融合聚类和智能蜂群算法(DFSABC_elite)的DDoS攻击检测系统。该系统将聚类算法与智能蜂群算法相结合来进行数据流分类,用流量特征分布熵与广义似然比较判别因子来检测DDoS攻击数据流的特征,从而实现了DDoS攻击数据流的高效检测。实验结果显示,该系统在类内紧密度、类间分离度、聚类准确率、算法耗时和DDoS检测准确率方面明显优于基于并行化K-means的普通蜂群算法和基于并行化K-means算法的DDoS检测方法。
中图分类号:
[1]SOPHIA G A,GANDHI M.Stealthy DDoS detecting mecha-nism for cloud resilience system[C]∥2017 International Confe-rence on Information Communication and Embedded Systems (ICICES).IEEE,2017:1-5. [2]MODI C,PATEL D,BORISANIYA B,et al.A survey on security issues and solutions at different layers of Cloud computing[J].The Journal of Supercomputing,2013,63(2):561-592. [3]HAN D Z,BI K,JIN J,et al.A DDoS Attack Detection System Based on Spark Framework[J].Computer Science & Information Systems,2017,14:28. [4]GUELLIL I,AZOUAOU F.Arabic Dialect Identification with an Unsupervised Learning (Based on a Lexicon).Application Case:ALGERIAN Dialect[C]∥Computational Science and Engineering.IEEE,2017:724-731. [5]SAIDA I B,KAMEL N,OMAR B.A New Hybrid Algorithm for Document Clustering Based on Cuckoo Search and K-means[M]∥Recent Advances on Soft Computing and Data Mining.Springer International Publishing,2014:59-68. [6]NIU B,DUAN Q,LIU J,et al.A population-based clusteringtechnique using particle swarm optimization and k-means[J].Natural Computing,2016,16(1):1-15. [7]TEODOROVIC' D,ORCO M D.Advanced OR and AI Methods inTransportation BEE Colony Optimization- A Cooperative Learning Approach to Complex Transportation PRoblems∥Proceedings of the 16th Mini-EURO Conference and 10th Meeting of EWGT.2008. [8]KARABOGA D,BASTURK B.On the performance of artificial bee colony (ABC) algorithm[J].Applied Soft Computing,2008,8(1):687-697. [9]ZHAO W,MA H,HE Q.Parallel k-means clustering based on mapreduce[C]∥IEEE International Conference on Cloud Computing.Springer Berlin Heidelberg,2009:674-679. [10]CUI L,LI G,LIN Q,et al.A novel artificial bee colony algorithm with depth-first search framework and elite-guided search equation.Information Sciences,2016,367-368:1012-1044. [11]PRÍNCIPE J C,MIIKKULAINEN R.Advances in self-organi-zing maps[C]∥Advances in Self-Organizing Maps:7th International Workshop,WSOM 2009.Springer,2009. [12]DU B,SUN Y,CAI S,et al.Object Tracking in Satellite Videos by Fusing the Kernel Correlation Filter and the Three-Frame-Difference Algorithm[J].IEEE Geoscience & Remote Sensing Letters,2017,PP(99):1-5. [13]CAO Y C,CAI Z Q,SHAO Y B.An improved artificial bee colony clustering algorithm based on K-means [J].Journal of Computer Applications,2014,34(1):204-207.(in Chinese) 曹永春,蔡正琦,邵亚斌.基于 K-means的改进人工蜂群聚类算法[J].计算机应用,2014,34(1):204-207. [14]YANG X R,HAN B,SUN Z G,et al.SDN-based DDoS Attack Detection with Cross-Plane Collaboration and Lightweight Flow Monitoring[C]∥Global Communications Conference.2017. [15]YAN Y,ZHANG S,TANG J,et al.Understanding characteristics in multivariate traffic flow time series from complex network structure[J].Physica A:Statistical Mechanics & Its Applications,2017,477. [16]LAKHINA A,CROVELLA M,DIOT C.Mininganomalies using traffic feature distributions∥Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications.ACM,2005:217-228. [17]PENG T,LECKIE C,RAMAMOHANARAO K.Proactivelydetecting distributed denial of service attacks using source IP address monitoring[C]∥International Conference on Research in Networking.Springer Berlin Heidelberg,2004:771-782. [18]SUN Q D,ZHANG D Y,GAO P.Distributed Denial of Service Attack Detection Based on Time Series Analysis.Chinese Journal of Computers,2005,28(5):767-773.(in Chinese) 孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测.计算机学报,2005,28(5):767-773. [19]XU Z,ZHU S,FU B,et al.Motion coherence based abnormalbehavior detection[C]∥Control and Decision Conference.IEEE,2017:214-218. [20]HAN D Z,BI K,XIE B L,et al.An Anomaly Detection on the Application-Layer -Based QoS in the Cloud Storage System[J].Computer Science and Information Systems,2016,13(2):659-676. [21]YUAN Y,WANG D,WANG Q.Anomaly Detection in TrafficScenes via Spatial-Aware Motion Reconstruction[J].IEEE Transactions on Intelligent Transportation Systems,2017,18(5):1198-1209. [22]CHANG R K C.Defending against flooding-based distributeddenial-of-service attacks:a tutorial[J].IEEE Communications Magazine,2002,40(10):42-51. [23]LEMON J.Resisting SYN Flood DoS Attacks with a SYNCache[C]∥Bsdcon Conference.2002. [24]WU J S,ZHANG W P,MA Y.The Data Analysis of KDDCUP99 Data Set [J].Computer Applications and Software,2014 (11):321-325.(in Chinese) 吴建胜,张文鹏,马垣.KDDCUP99数据集的数据分析研究[J].计算机应用与软件,2014(11):321-325. [25]AHMED H,ISMAIL M A,HYDER M F,et al.PerformanceComparison of Spark Clusters Configured Conventionally and a Cloud Service.Procedia Computer Science,2016,82:99-106. [26]ZAHARIA M,DAS T,LI H,et al.Discretized Streams:An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters[C]∥Usenix Conference on Hot Topics in Cloud Computing.USENIX Association,2012. |
[1] | 柴慧敏, 张勇, 方敏. 基于特征相似度聚类的空中目标分群方法 Aerial Target Grouping Method Based on Feature Similarity Clustering 计算机科学, 2022, 49(9): 70-75. https://doi.org/10.11896/jsjkx.210800203 |
[2] | 张亚迪, 孙悦, 刘锋, 朱二周. 结合密度参数与中心替换的改进K-means算法及新聚类有效性指标研究 Study on Density Parameter and Center-Replacement Combined K-means and New Clustering Validity Index 计算机科学, 2022, 49(1): 121-132. https://doi.org/10.11896/jsjkx.201100148 |
[3] | 李杉, 许新征. 基于双角度并行剪枝的VGG16优化方法 Parallel Pruning from Two Aspects for VGG16 Optimization 计算机科学, 2021, 48(6): 227-233. https://doi.org/10.11896/jsjkx.200800016 |
[4] | 汤鑫瑶, 张正军, 储杰, 严涛. 基于自然最近邻的密度峰值聚类算法 Density Peaks Clustering Algorithm Based on Natural Nearest Neighbor 计算机科学, 2021, 48(3): 151-157. https://doi.org/10.11896/jsjkx.200100112 |
[5] | 王茂光, 杨行. 一种基于AP-Entropy选择集成的风控模型和算法 Risk Control Model and Algorithm Based on AP-Entropy Selection Ensemble 计算机科学, 2021, 48(11A): 71-76. https://doi.org/10.11896/jsjkx.210200110 |
[6] | 王卫东, 徐金慧, 张志峰, 杨习贝. 基于密度峰值聚类的高斯混合模型算法 Gaussian Mixture Models Algorithm Based on Density Peaks Clustering 计算机科学, 2021, 48(10): 191-196. https://doi.org/10.11896/jsjkx.200800191 |
[7] | 张煜, 陆亿红, 黄德才. 基于密度峰值的加权犹豫模糊聚类算法 Weighted Hesitant Fuzzy Clustering Based on Density Peaks 计算机科学, 2021, 48(1): 145-151. https://doi.org/10.11896/jsjkx.200400043 |
[8] | 徐守坤, 倪楚涵, 吉晨晨, 李宁. 基于YOLOv3的施工场景安全帽佩戴的图像描述 Image Caption of Safety Helmets Wearing in Construction Scene Based on YOLOv3 计算机科学, 2020, 47(8): 233-240. https://doi.org/10.11896/jsjkx.190600109 |
[9] | 邓定胜. 一种改进的DBSCAN算法在Spark平台上的应用 Application of Improved DBSCAN Algorithm on Spark Platform 计算机科学, 2020, 47(11A): 425-429. https://doi.org/10.11896/jsjkx.190700071 |
[10] | 田献珍, 孙立强, 田振中. 基于蚁群算法的图像重建 Image Reconstruction Based on Ant Colony Algorithm 计算机科学, 2020, 47(11A): 231-235. https://doi.org/10.11896/jsjkx.191000128 |
[11] | 张建新, 刘弘, 李焱. 一种面向人群疏散的高效分组方法 Efficient Grouping Method for Crowd Evacuation 计算机科学, 2019, 46(6): 231-238. https://doi.org/10.11896/j.issn.1002-137X.2019.06.035 |
[12] | 胡闯, 杨庚, 白云璐. 面向差分隐私保护的聚类算法 Clustering Algorithm in Differential Privacy Preserving 计算机科学, 2019, 46(2): 120-126. https://doi.org/10.11896/j.issn.1002-137X.2019.02.019 |
[13] | 张天柱, 邹承明. 使用模糊聚类的胶囊网络在图像分类上的研究 Study on Image Classification of Capsule Network Using Fuzzy Clustering 计算机科学, 2019, 46(12): 279-285. https://doi.org/10.11896/jsjkx.190200315 |
[14] | 陈子豪, 李强. 基于K-medoids的改进PBFT共识机制 Improved PBFT Consensus Mechanism Based on K-medoids 计算机科学, 2019, 46(12): 101-107. https://doi.org/10.11896/jsjkx.181002014 |
[15] | 陈春涛, 陈优广. 基于影响空间的稳健密度峰值聚类算法 Influence Space Based Robust Fast Search and Density Peak Clustering Algorithm 计算机科学, 2019, 46(11): 216-221. https://doi.org/10.11896/jsjkx.181001846 |
|