Ddos Attack Detection Method Based on HMM and Chaos Model

A model and chaotic technology, applied in the field of communication, can solve the problems of no consideration relationship, low accuracy of DDoS attack detection, loss of information, etc., and achieve the effect of overcoming limitations, reducing the false positive rate of DDoS attack, and reducing the false alarm rate

Active Publication Date: 2021-02-02
维森派沃(无锡)科技有限公司 +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This type of DDoS attack detection directly infers the mark of the sample based on the current feature value, without considering the relationship between adjacent moments and features on the entire time axis, thus losing part of the information, resulting in low accuracy of DDoS attack detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ddos Attack Detection Method Based on HMM and Chaos Model
  • Ddos Attack Detection Method Based on HMM and Chaos Model
  • Ddos Attack Detection Method Based on HMM and Chaos Model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0038] In order to detect DDoS attack, the present invention provides a DDoS attack detection method based on HMM and chaos model.

[0039] figure 1 It is a flowchart of a method for detecting a DDoS attack based on an HMM and a chaotic model provided by an embodiment of the present invention.

[0040] S100, continuously collecting network traffic information for D units of time as an HMM training set;

[0041] In one embodiment, the network flow information includes the number of data packets and the numbe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention provides a DDoS attack detection method based on HMM and chaos model, comprising: collecting network traffic information as an HMM training set; calculating the network traffic weighted characteristic observation sequence and network flow average rate sequence; according to the HMM training set, calculating The optimal hidden layer state number N of HMM; The HMM training set is divided into N classes using a hierarchical clustering algorithm to obtain a hidden layer state sequence; using the network traffic weighted feature observation sequence and the hidden layer state sequence, the HMM performs supervised learning to obtain a state transition matrix and a confusion matrix; calculate subsequent network traffic weighted features according to the state transition matrix and the confusion matrix, and obtain a subsequent network traffic weighted feature prediction sequence; calculate the subsequent network through a chaos model A prediction error sequence of the flow weighted feature prediction sequence; identifying a DDoS attack by using the prediction error sequence and the network flow average rate sequence.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a DDoS attack detection method based on HMM and chaos model. Background technique [0002] Distributed Denial of Service (Distributed Denial of Service, DDoS) attack is an attack method often used by hackers and difficult to prevent. In recent years, with the rapid development of electronic encrypted virtual currency and the continuous increase of Internet of Things devices, DDoS attack methods have become more diversified, posing a huge threat to Internet security. [0003] The existing technology of DDoS attack detection based on machine learning is usually regarded as a binary classification problem. Representative features are selected from network traffic, and the feature sequences of attack traffic and normal traffic are respectively abstracted, and the sequence Each feature in is given a mark: attack or normal; then use the feature sequence to train the detection mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K9/62G06N7/08
CPCH04L63/1408H04L63/1416H04L63/1458G06N7/08G06F18/295
Inventor 程杰仁唐湘滟黄梦醒董哲张晨
Owner 维森派沃(无锡)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products