The Detection and Orientation Method to DRDoS Attack Based on Fuzzy Association Rules

نویسندگان

  • Xinyu Yang
  • Wenjing Yang
  • Yi Shi
  • Yage Gong
چکیده

DDoS (Distributed Denial of Service) attack is being the most extensive danger and difficulty to defense. A new kind of DDoS attack named DRDoS (Distributed Reflector Denial of Service) appears in recent years, which is more dangerous than DDoS attack because it is in stronger disguise. In this paper, the principle of DRDoS attack is studied and the network traffic is analyzed by fuzzy association rules with path restricted when DRDoS attack happens. And the association rules about spoofed network traffic and attack network traffic are mined. Also the DRDoS Attack Defensive Architecture based on Multi-Agent (DAMA) is set up in order to realize the detection, orientation and defensive function. DAMA is validated by NS-2 platform. It can detect and orient the attack source in a short time, realize screening the attack source and stop transmitting attack traffic. The experimental result proves that DAMA can find out the attack, orient the attack source and hold out the attack effectively.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

متن کامل

Edge Detection Based On Nearest Neighbor Linear Cellular Automata Rules and Fuzzy Rule Based System

 Edge Detection is an important task for sharpening the boundary of images to detect the region of interest. This paper applies a linear cellular automata rules and a Mamdani Fuzzy inference model for edge detection in both monochromatic and the RGB images. In the uniform cellular automata a transition matrix has been developed for edge detection. The Results have been compared to the ...

متن کامل

Edge Detection Based On Nearest Neighbor Linear Cellular Automata Rules and Fuzzy Rule Based System

 Edge Detection is an important task for sharpening the boundary of images to detect the region of interest. This paper applies a linear cellular automata rules and a Mamdani Fuzzy inference model for edge detection in both monochromatic and the RGB images. In the uniform cellular automata a transition matrix has been developed for edge detection. The Results have been compared to the ...

متن کامل

CARD (Continuous and Random Dropping) based DRDOS Attack Detection and Prevention Techniques in MANET

The DDOS is “distributed-denial-of-service” meaning many “zombies or daemons” computers performing a DOS (Denial of Service) attack on one computer, usually directed by one “master”. In MANETs, DOS attacks not only consume the scarce system resources, such as bandwidth, battery energy, or CPU cycles, but also isolate legitimate users from a network. The DOS attacks may impact the network connec...

متن کامل

Autonomous Parallel Parking of a Car Based on Parking Space Detection and Fuzzy Controller

This paper develops an automatic parking algorithm based on a fuzzy logic controller with the vehicle pose for the input and the steering angle for the output. In this way some feasible reference trajectory path have been introduced according to geometric and kinematic constraints and nonholonomic constraints to simulate motion path of car. Also a novel method is used for parking space detec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006