Computer Science ›› 2015, Vol. 42 ›› Issue (Z11): 378-380.

Previous Articles     Next Articles

Detection Method and Performance Analysis of Network Attacks Based on Cloud Model

XIE Li-chun and ZHANG Chun-qin   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In order to effectively determine whether network packets were attacked or not,a new detection algorithm DMCM(Detection Method based on Cloud Model) was proposed based on the cloud mode.Firstly,the state indicator of each packet was defined in terms of the discreteness and deviation of the properties of packets.Then,the process of computing the distribution of standard deviation was presented based on the cloud model.The distribution was used to determine the anomaly states of packets.Finally,a comprehensive experiments were conducted to study the performance of the DMCM algorithm through simulation using OPNET and MATLAB.Experimental results show that the proposed algorithm performs better than other algorithms in terms of adaptability.

Key words: Packet,Attack,Detection,Anomaly,Cloud model

[1] Varadharajan V,Tupakula U.Counteracting security attacks in virtual machines in the cloud using property based attestation[J].Journal of Network and Computer Applications,2014,40(7):31-45
[2] Younis Y A,Kifayat K,Merabti M.An access control model for cloud computing [J].Journal of Information Security and Applications,2014,19(1):45-60
[3] 杨宏宇,常媛.基于K均值多重主成分分析的App-DDoS检测方法[J].通信学报,2014,35(5):16-24
[4] Yu Yong,Niu Lei,Yang Guo-min,et al.On the security of auditing mechanisms for secure cloud storage [J].Future Generation Computer Systems,2014,30(1):127-132
[5] 王会梅,鲜明,王国玉.基于扩展网络攻击图的网络攻击策略生成算法[J].电子与信息学报,2011,33(12):3015-3021
[6] 谢柏林,余顺争.基于应用层协议分析的应用层实时主动防御系统[J].计算机学报,2011,34(3):452-463
[7] 程宏兵,容淳铭,黄晓,等.高效的攻击检测与数据融合算法[J].通信学报,2012,33(9):85-94
[8] 张玲,白中英,罗守山,等.基于粗糙集和人工免疫的集成入侵检测模型[J].通信学报,2013,34(9):166-175
[9] 席荣荣,云晓春,张永铮,等.一种改进的网络安全态势量化评估方法 [J].计算机学报,2014,31(3):95-101
[10] 储泽楠,李世扬.基于节点生长马氏距离K均值和HMM的网络入侵检测方法设计[J].计算机测量与控制,2014,37(10):1-12
[11] 张冰涛,王小鹏.面向 WSN 安全路由协议的自适应威胁模型[J].计算机应用研究,2014,31(4):1208-1211
[12] Vissers T,Somasundaram T S,Pieters L,et al.DDoS defense system for Web services in a cloud environment [J].Future Generation Computer Systems,2014,37:37-45
[13] 朱建明,宋彪,黄启发.基于系统动力学的网络安全攻防演化博弈模型[J].通信学报,2014,5(1):54-61
[14] 刘禹,李德毅,张光卫,等.云模型雾化特性及在进化算法中的应用[J].电子学报,2009,37(8):1651-1658
[15] 张亚玲,韩照国,任娇霞.基于相对熵理论的多测度网络异常检测方法[J].计算机应用,2010,30(7):1771-1774
[16] Worku S G,Xu Chun-xiang,Zhao Ji-ning,et al.Secure and efficient privacy-preserving public auditing scheme for cloud storage [J].Computers & Electrical Engineering,2014,40(5):1703-1713

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!