计算机科学 ›› 2015, Vol. 42 ›› Issue (Z11): 378-380.

• 信息安全 • 上一篇    下一篇

基于云模型的网络攻击检测方法及其性能分析

谢立春,张春琴   

  1. 浙江工业职业技术学院 绍兴312000;东南大学电气工程学院 南京211189,浙江工业职业技术学院 绍兴312000
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受浙江省自然科学基金(y1080023)资助

Detection Method and Performance Analysis of Network Attacks Based on Cloud Model

XIE Li-chun and ZHANG Chun-qin   

  • Online:2018-11-14 Published:2018-11-14

摘要: 为了有效判断网络数据包是否存在被攻击的可能性,提出了一种新的基于云模型的检测算法DMCM(Detection Method based on Cloud Model)。该算法首先结合数据包属性的离散度和偏差定义了状态指标,并根据云模型给出了标准差分布的计算流程,以此判断数据包的异常状况。最后,通过OPNET和MATLAB进行仿真实验,深入研究了影响该算法的关键因素,同时 与其它算法之间进行了性能对比,结果表明DMCM具有较好的适应性。

关键词: 数据包,攻击,检测,异常,云模型

Abstract: In order to effectively determine whether network packets were attacked or not,a new detection algorithm DMCM(Detection Method based on Cloud Model) was proposed based on the cloud mode.Firstly,the state indicator of each packet was defined in terms of the discreteness and deviation of the properties of packets.Then,the process of computing the distribution of standard deviation was presented based on the cloud model.The distribution was used to determine the anomaly states of packets.Finally,a comprehensive experiments were conducted to study the performance of the DMCM algorithm through simulation using OPNET and MATLAB.Experimental results show that the proposed algorithm performs better than other algorithms in terms of adaptability.

Key words: Packet,Attack,Detection,Anomaly,Cloud model

[1] Varadharajan V,Tupakula U.Counteracting security attacks in virtual machines in the cloud using property based attestation[J].Journal of Network and Computer Applications,2014,40(7):31-45
[2] Younis Y A,Kifayat K,Merabti M.An access control model for cloud computing [J].Journal of Information Security and Applications,2014,19(1):45-60
[3] 杨宏宇,常媛.基于K均值多重主成分分析的App-DDoS检测方法[J].通信学报,2014,35(5):16-24
[4] Yu Yong,Niu Lei,Yang Guo-min,et al.On the security of auditing mechanisms for secure cloud storage [J].Future Generation Computer Systems,2014,30(1):127-132
[5] 王会梅,鲜明,王国玉.基于扩展网络攻击图的网络攻击策略生成算法[J].电子与信息学报,2011,33(12):3015-3021
[6] 谢柏林,余顺争.基于应用层协议分析的应用层实时主动防御系统[J].计算机学报,2011,34(3):452-463
[7] 程宏兵,容淳铭,黄晓,等.高效的攻击检测与数据融合算法[J].通信学报,2012,33(9):85-94
[8] 张玲,白中英,罗守山,等.基于粗糙集和人工免疫的集成入侵检测模型[J].通信学报,2013,34(9):166-175
[9] 席荣荣,云晓春,张永铮,等.一种改进的网络安全态势量化评估方法 [J].计算机学报,2014,31(3):95-101
[10] 储泽楠,李世扬.基于节点生长马氏距离K均值和HMM的网络入侵检测方法设计[J].计算机测量与控制,2014,37(10):1-12
[11] 张冰涛,王小鹏.面向 WSN 安全路由协议的自适应威胁模型[J].计算机应用研究,2014,31(4):1208-1211
[12] Vissers T,Somasundaram T S,Pieters L,et al.DDoS defense system for Web services in a cloud environment [J].Future Generation Computer Systems,2014,37:37-45
[13] 朱建明,宋彪,黄启发.基于系统动力学的网络安全攻防演化博弈模型[J].通信学报,2014,5(1):54-61
[14] 刘禹,李德毅,张光卫,等.云模型雾化特性及在进化算法中的应用[J].电子学报,2009,37(8):1651-1658
[15] 张亚玲,韩照国,任娇霞.基于相对熵理论的多测度网络异常检测方法[J].计算机应用,2010,30(7):1771-1774
[16] Worku S G,Xu Chun-xiang,Zhao Ji-ning,et al.Secure and efficient privacy-preserving public auditing scheme for cloud storage [J].Computers & Electrical Engineering,2014,40(5):1703-1713

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!