基于神经模糊聚类的网络DDoS攻击检测

IF 0.5 Q4 ENGINEERING, MULTIDISCIPLINARY International Journal of Critical Infrastructures Pub Date : 2017-04-17 DOI:10.1504/IJCIS.2017.10004199
K. Saravanan
{"title":"基于神经模糊聚类的网络DDoS攻击检测","authors":"K. Saravanan","doi":"10.1504/IJCIS.2017.10004199","DOIUrl":null,"url":null,"abstract":"The detection system developed for wired networks cannot be deployed in wireless networks due to the difference between the two types of networks. The data transmission of the wired network is a standard physical routing. However, the data stream routing of wireless network are based on radio signals with a variety of problems of evolution. The attacker's packet header data are acknowledged with a port number, option field parameters and IP address. The anomalies detection is carried out at a regular interval to monitor the traffic analysed through statistical variance. The change detection detects the statistical variance of the traffic volume. The results obtained from the proposed system are compared with the existing attack detection systems with the propagation delay metric. It shows a reduction of nearly 10% and an improvement of 13% average throughput.","PeriodicalId":44956,"journal":{"name":"International Journal of Critical Infrastructures","volume":"48 1","pages":"46-56"},"PeriodicalIF":0.5000,"publicationDate":"2017-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Neuro-fuzzy-based clustering of DDoS attack detection in the network\",\"authors\":\"K. Saravanan\",\"doi\":\"10.1504/IJCIS.2017.10004199\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The detection system developed for wired networks cannot be deployed in wireless networks due to the difference between the two types of networks. The data transmission of the wired network is a standard physical routing. However, the data stream routing of wireless network are based on radio signals with a variety of problems of evolution. The attacker's packet header data are acknowledged with a port number, option field parameters and IP address. The anomalies detection is carried out at a regular interval to monitor the traffic analysed through statistical variance. The change detection detects the statistical variance of the traffic volume. The results obtained from the proposed system are compared with the existing attack detection systems with the propagation delay metric. It shows a reduction of nearly 10% and an improvement of 13% average throughput.\",\"PeriodicalId\":44956,\"journal\":{\"name\":\"International Journal of Critical Infrastructures\",\"volume\":\"48 1\",\"pages\":\"46-56\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2017-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Critical Infrastructures\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJCIS.2017.10004199\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Critical Infrastructures","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJCIS.2017.10004199","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 1

摘要

由于有线网络和无线网络之间的差异,为有线网络开发的检测系统不能部署在无线网络中。有线网络的数据传输是一个标准的物理路由。然而,无线网络的数据流路由是基于无线电信号的,存在着各种发展问题。攻击者的包头数据被确认为端口号、选项字段参数和IP地址。定期进行异常检测,通过统计方差分析对流量进行监测。变化检测检测流量的统计方差。将该系统的检测结果与现有的基于传播延迟度量的攻击检测系统进行了比较。它显示减少了近10%,平均吞吐量提高了13%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Neuro-fuzzy-based clustering of DDoS attack detection in the network
The detection system developed for wired networks cannot be deployed in wireless networks due to the difference between the two types of networks. The data transmission of the wired network is a standard physical routing. However, the data stream routing of wireless network are based on radio signals with a variety of problems of evolution. The attacker's packet header data are acknowledged with a port number, option field parameters and IP address. The anomalies detection is carried out at a regular interval to monitor the traffic analysed through statistical variance. The change detection detects the statistical variance of the traffic volume. The results obtained from the proposed system are compared with the existing attack detection systems with the propagation delay metric. It shows a reduction of nearly 10% and an improvement of 13% average throughput.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Critical Infrastructures
International Journal of Critical Infrastructures ENGINEERING, MULTIDISCIPLINARY-
CiteScore
2.00
自引率
16.70%
发文量
29
期刊介绍: IJCIS is an inter-disciplinary and refereed journal that provides a professional and scholarly forum for cross-learning between different scientific and technological disciplines, and between business and economic, as well as between societal and managerial, disciplines in the area of critical infrastructures. Critical infrastructures are networks for the provision of telecommunication and information services, energy services, water supply, transportation of people and goods, banking and financial services, government services and emergency services. By addressing commonalities and interrelationships between the various sectors, IJCIS enables scientists, policy makers and professionals in the field to learn from experiences in other countries and in other infrastructure sectors.
期刊最新文献
CPW-Fed Printed Patch Antenna for 5G-IoT Infrastructure Development The dynamic and secure storage of enterprise financial data based on cloud platform Application of Deep Learning Approach for detecting Brain Tumor in MR Images The Vibration Control of Magnetorheological Elastomer Damper for Eccentric Workshop Enabling Active Safety System along with Realtime monitoring and audio alerts in Two Wheelers through Smart Helmet System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1