LDDoS attack detection method based on chaotic Dufing oscillators

An attack detection and vibrator technology, applied in digital transmission systems, electrical components, transmission systems, etc.

Inactive Publication Date: 2014-10-29
CIVIL AVIATION UNIV OF CHINA
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The detection methods proposed above have more or less deficiencies in detection rate, false alarm rate, algorithm complexity and hardware implementation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • LDDoS attack detection method based on chaotic Dufing oscillators
  • LDDoS attack detection method based on chaotic Dufing oscillators
  • LDDoS attack detection method based on chaotic Dufing oscillators

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] 1. The simulation scene used is as attached Figure 4 As shown, a dumbbell-shaped network topology is used. In the simulation environment, five normal sending nodes (2-6) are set up, black nodes 9 and 10 represent two attack sources, nodes 7 and 8 are TCP and UDP servers respectively, and two routers are represented by nodes 0 and 1 respectively. FTP transmission is enabled between the normal node and node 7 (TCP server), UDP attack traffic is transmitted between the attack source node and node 8 (UDP server), and the one-way delay of all links including the bottleneck link is 10 milliseconds . The congestion control protocol used by TCP normal nodes is TCP Reno. The detection node is located at the front end of router 1, and the sampling interval is 10 milliseconds.

[0015] The system starts at 0 seconds and ends at 121 seconds. Normal TCP traffic starts at some random time after 1 second and ends at 121 seconds; attack traffic (UDP) comes later at 20 seconds and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Through study of loopholes of a TCP congestion control mechanism used by LDDoS (Low-rate Distributed Denial of Service) attacks and time frequency characteristics of network traffic, an LDDoS attack detection method based on chaotic Dufing oscillators obtains through induction that the essence of a problem of LDDoS attack detection is a problem of extraction of 'weak' square wave signals, the cycle of which is RTO<min>, under strong TCP background noises, the cycle of which is RTT. On the basis of using a Duffing system to detect the weak periodic signals, a basic idea and a concrete realization method for using a Duffing equation to construct chaotic oscillators and detect LDDoS attacks are invented so that a technology of using a double-Duffing-osicillator differential chaotic system to estimate attack parameters is realized. Through carrying out of a series of simulation tests in combination with experiment result analysis, feasibility of a detection model and an estimation method is verified and an objective of LDDoS attack detection is realized.

Description

technical field [0001] The invention relates to a computer network security technology, especially for detection of low-rate distributed denial of service (Low-rate Distributed Denial of Service, LDDoS) attack, which can effectively detect small LDDoS attack flow hidden under TCP background noise. Background technique [0002] LDDoS attack, due to its great harm and concealment, has been a hot research issue. Since the traditional methods of detecting and defending against DDoS attacks are no longer suitable for LDDoS attacks, new approaches need to be found. [0003] After in-depth exploration, researchers use the time-frequency domain feature extraction of attack flows as a breakthrough point, and use digital signal processing methods to solve the detection problem of LDDoS, and have proposed some detection and defense methods. For example, Habin Sun proposed to use the Dynamic Time Warping method (Dynamic Time Warping, DTW) commonly used in speech recognition to match th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/00
Inventor 岳猛吴志军马兰
Owner CIVIL AVIATION UNIV OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products