{"title":"基于神经模糊聚类的网络DDoS攻击检测","authors":"K. Saravanan","doi":"10.1504/IJCIS.2017.10004199","DOIUrl":null,"url":null,"abstract":"The detection system developed for wired networks cannot be deployed in wireless networks due to the difference between the two types of networks. The data transmission of the wired network is a standard physical routing. However, the data stream routing of wireless network are based on radio signals with a variety of problems of evolution. The attacker's packet header data are acknowledged with a port number, option field parameters and IP address. The anomalies detection is carried out at a regular interval to monitor the traffic analysed through statistical variance. The change detection detects the statistical variance of the traffic volume. The results obtained from the proposed system are compared with the existing attack detection systems with the propagation delay metric. It shows a reduction of nearly 10% and an improvement of 13% average throughput.","PeriodicalId":44956,"journal":{"name":"International Journal of Critical Infrastructures","volume":"48 1","pages":"46-56"},"PeriodicalIF":0.5000,"publicationDate":"2017-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Neuro-fuzzy-based clustering of DDoS attack detection in the network\",\"authors\":\"K. Saravanan\",\"doi\":\"10.1504/IJCIS.2017.10004199\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The detection system developed for wired networks cannot be deployed in wireless networks due to the difference between the two types of networks. The data transmission of the wired network is a standard physical routing. However, the data stream routing of wireless network are based on radio signals with a variety of problems of evolution. The attacker's packet header data are acknowledged with a port number, option field parameters and IP address. The anomalies detection is carried out at a regular interval to monitor the traffic analysed through statistical variance. The change detection detects the statistical variance of the traffic volume. The results obtained from the proposed system are compared with the existing attack detection systems with the propagation delay metric. It shows a reduction of nearly 10% and an improvement of 13% average throughput.\",\"PeriodicalId\":44956,\"journal\":{\"name\":\"International Journal of Critical Infrastructures\",\"volume\":\"48 1\",\"pages\":\"46-56\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2017-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Critical Infrastructures\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJCIS.2017.10004199\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Critical Infrastructures","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJCIS.2017.10004199","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
Neuro-fuzzy-based clustering of DDoS attack detection in the network
The detection system developed for wired networks cannot be deployed in wireless networks due to the difference between the two types of networks. The data transmission of the wired network is a standard physical routing. However, the data stream routing of wireless network are based on radio signals with a variety of problems of evolution. The attacker's packet header data are acknowledged with a port number, option field parameters and IP address. The anomalies detection is carried out at a regular interval to monitor the traffic analysed through statistical variance. The change detection detects the statistical variance of the traffic volume. The results obtained from the proposed system are compared with the existing attack detection systems with the propagation delay metric. It shows a reduction of nearly 10% and an improvement of 13% average throughput.
期刊介绍:
IJCIS is an inter-disciplinary and refereed journal that provides a professional and scholarly forum for cross-learning between different scientific and technological disciplines, and between business and economic, as well as between societal and managerial, disciplines in the area of critical infrastructures. Critical infrastructures are networks for the provision of telecommunication and information services, energy services, water supply, transportation of people and goods, banking and financial services, government services and emergency services. By addressing commonalities and interrelationships between the various sectors, IJCIS enables scientists, policy makers and professionals in the field to learn from experiences in other countries and in other infrastructure sectors.