TY - JOUR
T1 - A DDoS attack situation assessment method via optimized cloud model based on influence function
AU - Tang, Xiangyan
AU - Zheng, Qidong
AU - Cheng, Jieren
AU - Sheng, Victor S.
AU - Cao, Rui
AU - Chen, Meizhu
N1 - Funding Information:
This work was supported by the Hainan Provincial Natural Science Foundation of China [2018CXTD333, 617048]; National Natural Science Foundation of China [61762033, 61702539]; Hainan University Doctor Start Fund Project [kyqd1328]; Hainan University Youth Fund Project [qnjj1444]; Hainan philosophy and social science 2016 planning project achievements [HNSK(YB)16-86].
Funding Information:
Funding: This work was supported by the Hainan Provincial Natural Science Foundation of China [2018CXTD333, 617048]; National Natural Science Foundation of China [61762033, 61702539]; Hainan University Doctor Start Fund Project [kyqd1328]; Hainan University Youth Fund Project [qnjj1444]; Hainan philosophy and social science 2016 planning project achievements [HNSK(YB)16-86].
Publisher Copyright:
© 2019 Tech Science Press. All rights reserved.
PY - 2019
Y1 - 2019
N2 - The existing network security situation assessment methods cannot effectively assess the Distributed denial-of-service (DDoS) attack situation. In order to solve these problems, we propose a DDoS attack situation assessment method via optimized cloud model based on influence function. Firstly, according to the state change characteristics of the IP addresses which are accessed by new and old user respectively, this paper defines a fusion feature value. Then, based on this value, we establish a V-Support Vector Machines (V-SVM) classification model to analyze network flow for identifying DDoS attacks. Secondly, according to the change of new and old IP addresses, we propose three evaluation indexes. Furthermore, we propose index weight calculation algorithm to measure the importance of different indexes. According to the fusion index, which is optimized by the weighted algorithm, we define the Risk Degree (RD) and calculate the RD value of each network node. Then we obtain the situation information of the whole network according to the RD values, which are from each network nodes with different weights. Finally, the whole situation information is classified via cloud model to quantitatively assess the DDoS attack situation. The experimental results show that our method can not only improve the detection rate and reduce the missing rate of DDoS attacks, but also access the DDoS attack situation effectively. This method is more accurate and flexible than the existing methods.
AB - The existing network security situation assessment methods cannot effectively assess the Distributed denial-of-service (DDoS) attack situation. In order to solve these problems, we propose a DDoS attack situation assessment method via optimized cloud model based on influence function. Firstly, according to the state change characteristics of the IP addresses which are accessed by new and old user respectively, this paper defines a fusion feature value. Then, based on this value, we establish a V-Support Vector Machines (V-SVM) classification model to analyze network flow for identifying DDoS attacks. Secondly, according to the change of new and old IP addresses, we propose three evaluation indexes. Furthermore, we propose index weight calculation algorithm to measure the importance of different indexes. According to the fusion index, which is optimized by the weighted algorithm, we define the Risk Degree (RD) and calculate the RD value of each network node. Then we obtain the situation information of the whole network according to the RD values, which are from each network nodes with different weights. Finally, the whole situation information is classified via cloud model to quantitatively assess the DDoS attack situation. The experimental results show that our method can not only improve the detection rate and reduce the missing rate of DDoS attacks, but also access the DDoS attack situation effectively. This method is more accurate and flexible than the existing methods.
KW - Cloud model
KW - DDoS attack
KW - Influence function
KW - V-SVM
UR - http://www.scopus.com/inward/record.url?scp=85075262129&partnerID=8YFLogxK
U2 - 10.32604/cmc.2019.06173
DO - 10.32604/cmc.2019.06173
M3 - Article
AN - SCOPUS:85075262129
SN - 1546-2218
VL - 60
SP - 1263
EP - 1281
JO - Computers, Materials and Continua
JF - Computers, Materials and Continua
IS - 3
ER -