The design and implementation of IP trace back method of DDoS attack using fastICA traffic analysis

被引:0
作者
Xiang, Gao [1 ]
Xin, Zhang [1 ]
Xiao, Wang [1 ]
机构
[1] School of Computer Science and Engineer, Northwest Polytechnical University
关键词
DDoS; FastICA; IP traceback; Traffic model;
D O I
10.4156/jcit.vol7.issue23.8
中图分类号
学科分类号
摘要
With the rapid development of information technology, the Internet security problem is becoming increasing severe. DDos has become a tremendously harmful internet attack method because of its many characterisitics such as easy to implement. In this paper we try to track DDoS attack source with more effective means.By applying Fast Fixed-point Algorithm for Independent Component Analysis(FastICA) which is widely exercised in digital signal processing recently to the field of network security and combining DDoS source track technology based on flow model matchingthis essay has put forward a new traceback method of DDoS attack utilizing analysis of traffic models based on fast ICA. Simulation experiment, verification and research has also been carried out to test the practical efficiency of this method.
引用
收藏
页码:57 / 65
页数:8
相关论文
共 26 条
  • [1] DDoS attack detection method using cluster analysis
    Lee, Keunsoo
    Kim, Juhyun
    Kwon, Ki Hoon
    Han, Younggoo
    Kim, Sehun
    EXPERT SYSTEMS WITH APPLICATIONS, 2008, 34 (03) : 1659 - 1665
  • [2] A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic
    Tian, Qiwen
    Miyata, Sumiko
    IOT, 2023, 4 (02): : 95 - 111
  • [3] IP trace back techniques to ferret out denial of service attack source
    Aijaz, Adnan
    Mohsin, Syed Raza
    Mofassir-Ul-Haque
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 135 - 140
  • [4] A Real-Time DDoS Attack Detection and Prevention System Based on per-IP Traffic Behavioral Analysis
    Zhang, Yi
    Liu, Qiang
    Zhao, Guofeng
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2010, : 163 - 167
  • [5] A Hadoop based analysis and detection model for IP Spoofing typed DDoS attack
    Zhang, Jian
    Liu, Pin
    He, Jianbiao
    Zhang, Yawei
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1976 - 1983
  • [6] DDoS: Design, implementation and analysis of automated model
    Tupakula, Udaya Kiran
    Varadharajan, Vijay
    Gajam, Ashok Kumar
    Vuppala, Sunil Kumar
    Rao, Pandalaneni Naga Srinivasa
    International Journal of Wireless and Mobile Computing, 2007, 2 (01) : 72 - 85
  • [7] Detect and Filter Traffic Attack through Cloud Trace back and Neural Network
    Alam, Mansaf
    Shakil, Kashish Ara
    Javed, Mohd. Salman
    Ansari, Manzoor
    Ambreen
    WORLD CONGRESS ON ENGINEERING, WCE 2015, VOL I, 2015, : 535 - 540
  • [8] Classification of DDoS attack traffic on SDN network environment using deep learning
    Clinton, Urikhimbam Boby
    Hoque, Nazrul
    Singh, Khumukcham Robindro
    CYBERSECURITY, 2024, 7 (01):
  • [9] DDoS Attack Detection using Fast Entropy Approach on Flow-Based Network Traffic
    David, Jisa
    Thomas, Ciza
    BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 30 - 36
  • [10] D3TAC: Utilizing Distributed Computing for DDoS Attack Traffic Analysis on the Cloud
    Khattak, Rana
    Anwar, Zahid
    Anwar, Zahid
    PROCEEDINGS OF THE 2016 19TH INTERNATIONAL MULTI-TOPIC CONFERENCE (INMIC), 2016, : 112 - 117