The design and implementation of IP trace back method of DDoS attack using fastICA traffic analysis

被引:0
作者
Xiang, Gao [1 ]
Xin, Zhang [1 ]
Xiao, Wang [1 ]
机构
[1] School of Computer Science and Engineer, Northwest Polytechnical University
关键词
DDoS; FastICA; IP traceback; Traffic model;
D O I
10.4156/jcit.vol7.issue23.8
中图分类号
学科分类号
摘要
With the rapid development of information technology, the Internet security problem is becoming increasing severe. DDos has become a tremendously harmful internet attack method because of its many characterisitics such as easy to implement. In this paper we try to track DDoS attack source with more effective means.By applying Fast Fixed-point Algorithm for Independent Component Analysis(FastICA) which is widely exercised in digital signal processing recently to the field of network security and combining DDoS source track technology based on flow model matchingthis essay has put forward a new traceback method of DDoS attack utilizing analysis of traffic models based on fast ICA. Simulation experiment, verification and research has also been carried out to test the practical efficiency of this method.
引用
收藏
页码:57 / 65
页数:8
相关论文
共 26 条
  • [21] Design and experiments of new IP traceback method based on offline analysis
    Kang, Ho-Seok
    Tin, Tran
    Kim, Sung-Ryul
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2014, 29 (06): : 429 - 436
  • [22] FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis
    Hoque, Nazrul
    Bhattacharyya, Dhruba K.
    Kalita, Jugal K.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2032 - 2041
  • [23] A method for reducing fuel consumption of urban scooters using vehicle design and traffic simulation
    Lin, Yu-An
    Chen, Pao-An
    Chan, Kuei-Yuan
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART C-JOURNAL OF MECHANICAL ENGINEERING SCIENCE, 2017, 231 (07) : 1252 - 1271
  • [24] Attack detection analysis in software-defined networks using various machine learning method
    Wang, Yonghong
    Wang, Xiaofeng
    Ariffin, Mazeyanti Mohd
    Abolfathi, Masoumeh
    Alqhatani, Abdulmajeed
    Almutairi, Laila
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [25] Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET
    M. Poongodi
    S. Bose
    Cluster Computing, 2015, 18 : 1549 - 1559
  • [26] Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET
    Poongodi, M.
    Bose, S.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2015, 18 (04): : 1549 - 1559