CN105956473A - Malicious code detection method based on SDN (Software Defined Networking) - Google Patents

Malicious code detection method based on SDN (Software Defined Networking) Download PDF

Info

Publication number
CN105956473A
CN105956473A CN201610315348.9A CN201610315348A CN105956473A CN 105956473 A CN105956473 A CN 105956473A CN 201610315348 A CN201610315348 A CN 201610315348A CN 105956473 A CN105956473 A CN 105956473A
Authority
CN
China
Prior art keywords
sdn
malicious code
network
different
characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610315348.9A
Other languages
Chinese (zh)
Other versions
CN105956473B (en
Inventor
刘兰
仇云利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Polytechnic Normal University
Original Assignee
Guangdong Polytechnic Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Polytechnic Normal University filed Critical Guangdong Polytechnic Normal University
Priority to CN201610315348.9A priority Critical patent/CN105956473B/en
Publication of CN105956473A publication Critical patent/CN105956473A/en
Application granted granted Critical
Publication of CN105956473B publication Critical patent/CN105956473B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a malicious code detection method based on an SDN (Software Defined Networking), and belongs to the technical field of computer network security. New opportunities and challenges of solving detection and prevention problems of malicious codes under new architecture are brought to a network information security field by a brand new design concept of separating control and forwarding of the SDN. According to the method, through analysis of an SDN switch flow table characteristic selection method, a security data ranking and dimension reduction method for traffic characteristic selection based on OpenFlow is provided; on this basis, through comparison of influences on the operation time of different classification algorithms after characteristic selection, a reduction dimension m selection problem is analyzed, and the optimum characteristic subsets and matched classification algorithms corresponding to different kinds of malicious codes are found; the propagation characteristics and evolution models of the malicious codes in an SDN mobile environment are analyzed, thereby obtaining the influences of a node migration rate in a mobile network on the infection condition and explosion time of the malicious codes in a source sub-network and a target sub-network, and the influences have reference values on the routing control of the SDN controller to the switch nodes or host nodes.

Description

Malicious code detecting method based on SDN
Technical field
The invention belongs to computer network security technology field.
Background technology
As a kind of novel network architecture based on software engineering, SDN(Software Defined Networking, software defined network) application of brand-new design concept and innovation formula brings to filed of network information security New opportunities and challenges.Owing to SDN uses the mode of centerized fusion, intuitively, it is meant that bigger security risk.Another Aspect, SDN also impacts conventional security guard technology, due to SDN control and forward separating, its open types of applications The leak brought of program is inevitable, and malicious code includes computer virus, network worm, wooden horse, logic bomb and DDOS Attacking, for SDN, the analysis of malicious code and detection are also the major issues needing to solve.
To this end, invention is based on SDN thought, sets up malicious code traffic characteristic under SDN framework and analyze model.By to SDN The flow collection of network flow table data and feature analysis, the sorting algorithm finding out coupling finds that all kinds of malice is attacked more accurately Hitting, core is the research of generation, Feature Selection and the sorting algorithm of data collection, stream table feature.
The centralized architecture of SDN can carry out logic management and control flexibly to network, feeds back according to the information of logical subnetwork, it is achieved To each node and the Macro or mass analysis of the network overall situation, thus select the counte-rplan of optimum.When some malicious codes are detected During discovery, can infer, by current network state, the position that security incident occurs, SDN controller is by amendment switch The stream list item of stream table realizes resetting of the logic network of network node (including mobile device, disparate networks equipment and main frame) To, the dynamic exchange route adjusting periphery, it is to avoid congested generation, but this also gives network malicious code in internetwork propagation Bring chance.When network is attacked by Large-scale intrusion, will be able to damage by changing the mode such as network topology, cooperation detection Mistake is preferably minimized.Under patent research SDN mobile environment of the present invention, malicious code is propagated and evolutionary model, for SDN controller management The formulation of strategy provides basis.It also is able to provide on theory and technology for the complex behavior detection method in network safety filed Foundation, helps the exploitation of next generation network security tool.
Summary of the invention
It is an object of the invention to, solve for the network security data extensive, high-dimensional in SDN finds malice The problem that code calculation consumption is huge.
The technical scheme is that, malicious code detecting method based on SDN, flow based on OpenFlow is special Levy choosing method, use various features choosing method that different discharge characteristics is ranked up, find out and can reflect malicious code Critical eigenvalues, it is achieved Data Dimensionality Reduction;For different types of malicious code, use different sorting algorithms and character subset Carry out the matching analysis, find out matching characteristic subset and sorting technique that different types of Malicious Code Detection is analyzed;Basis at this On realize SDN flow and redirect model and mobile network's EVOLUTION ANALYSIS.
(1) the secure data dimension reduction method that a kind of traffic characteristic based on OpenFlow is chosen is proposed.Choose suitably stream Flow characteristic, carries out fine-grained data analysis, and by higher-dimension (n dimension) characteristic dimensionality reduction, the optimum obtaining all kinds of malicious code is low Dimension (m dimension) character subset;
(2) according to the Critical eigenvalues after dimensionality reduction, com-parison and analysis difference sorting technique and character subset are to inhomogeneity malice generation The classification performance of code, obtains optimal feature subset and the classification and matching algorithm of certain class malicious code;
(3) analyze in different network modeies, infect the node mobility of malicious code to it at source subnet and targeted subnet Infection conditions and the impact of explosion time, propose a kind of malicious code propagation model in SDN mobile network.Divided by theory Analysis and numerical simulation, find out malicious code and travel to the propagation characteristic of targeted subnet and the mobility of subnet intermediate node from source subnet Relation.Analyze mobility threshold qc that malicious code spreads between corporations' subnet and propagates so that it is can reasonably reflect SDN The network dynamics new feature that new architecture brings.
Particular content includes:
(1) the secure data dimension reduction method that traffic characteristic based on OpenFlow is chosen.
SDN is based on stream table, and stream table can serve as the matched rule of packet, and the structure of SDN stream table comprises Three parts: packet header matching domain, enumerator and action.Along with the stream table design support to various agreements, mate more fine granularity Changing, its eigenvalue having also is increasing.The feature selection of OpenFlow flow table is secure data pretreatment in SDN Effective ways, by reducing the dimension of traffic characteristic, can reduce the complexity that security association is analyzed.Patent of the present invention pays close attention to spy Levy system of selection application in the switch stream table data of SDN.Be respectively adopted Fisher, ReliefF, mRMR, InfoGain, The traffic characteristic of OpenFlow flow table is ranked up by the feature selection approach such as CFS, LVF, and calculates according to different feature selections Method is comprehensively analyzed, and selects effective traffic characteristic data to carry out the foundation of next step model.
(2) optimal feature subset of inhomogeneity malicious code and optimal classification algorithms selection.
Different Network Abnormal scenes shows difference in discharge characteristic, and different data mining algorithms is special for flow Property matching degree the most different, different feature selection approach and data mining algorithm under the present invention emphatically research SDN environment Combination process, analyze after different feature selections Riming time of algorithm and different Feature Selection Algorithms and sorting algorithm The matching degree of energy.Analyze and show which the abnormal flow analysis for SDN flow should use crucial special under different scenes Levy to differentiate Traffic Anomaly.The reason causing abnormal flow has a lot, such as DDOS attack, witty anthelmintic, slow scan etc., its Traffic characteristic shows and is not quite similar, the front 8-12 dimension that Fisher, ReliefF and InfoGain scheduling algorithm is obtained Characteristic sequence is combined with sorting techniques such as DT, SVM and KNN respectively, calculates the accuracy rate of its classification results, finds out variety classes Malicious Code Detection analyze matching characteristic value and sorting technique.
(3) malicious code propagation characteristic analysis under SDN mobile environment
Set up the network model under SDN environment;Being considered as corporations by network subnet, subnet is internal is static corporations, and subnet Between be dynamic corporations.By analyzing in different network model, the node mobility between corporations to malicious code at source subnet With infection conditions and the impact of explosion time of targeted subnet, find that under mobile environment, the propagation of malicious code such as anthelmintic is to net The impact that network develops, provides theoretical foundation to SDN controller to telephone net node or host node route test.
Accompanying drawing explanation
Fig. 1 Malicious Code Detection based on SDN route map;
The character subset of Fig. 2 malicious code and sorting algorithm select flow chart.
Detailed description of the invention
The route map of the present invention is as shown in Figure 1.
In actually detected, stream table data collection module periodically sends stream table request, switch to OpenFlow switch The stream table information replied sends stream table collector node to by encrypted tunnel.Stream characteristic extracting module is according to the knot of feature analysis Really, receive the stream table data that stream table collection module gathers, extract m relevant stream feature composition m tuple, each m tuple It is used as mark, such that it is able to monitor which SDN switch to be found that certain class malice thing collecting the switch ID of these data Part.Classifier modules is responsible for classifying the m tuple collected, with distinguish flow in this period be any class abnormal flow also It it is normal discharge.
(1) OpenFlow flow table Feature Selection sorts with significance level
OpenFlow flow table uses circulation to send the traditional bag of replacement and forwards, and flow first looks at friendship when entering SDN switch Stream table on changing planes, has coupling then to perform corresponding actions, without coupling, just message is sent controller, controller determine The fixed stream table that how to generate sends switch.Therefore characteristic is chosen and can directly be selected from stream table.
The first step: build the characteristic of different dimensions;
At training sample generation phase, we can produce normal discharge and all kinds of malicious traffic stream such as in experimental situation DDOS, anthelmintic, scanning etc., the generation of all kinds of abnormal flows can produce by corresponding attack tool, and such as DDOS attack can To initiate the flow attackings such as TCP SYN flood, UDP flood.The equilibrium as far as possible of all kinds of exceptions and normal training subset.
40 packet header matching domains in convection current table, build the characteristic of different dimensions, and these Feature Selection may include that IP bag rate, ICMP bag rate, TCP bag rate, long bag rate, short bag rate, IP are to flow ratio, port speedup, inter-packet gap time, stream bag number, stream Byte number etc..
Second step: study the different feature selecting algorithm ranking results to corresponding data collection;
Use the different feature selecting algorithm such as Fisher, ReliefF, mRMR, InfoGain, CFS, LVF to corresponding data Collection carries out feature ordering, and the standard of its sequence is the feature importance calculated according to various algorithms.
By different Feature Selection algorithms, the feature of different classes of anomalous event can be found to arrange by inspection data Sequence, in the middle of this step, because also not having the participation of grader, it is impossible to directly select corresponding character subset, but can find one Fixed rule, by selecting 8-12 the feature set sorting earlier in algorithms of different to analyze its dependency and similarity. Can comprehensively analyze according to different feature selecting algorithm, select effective traffic characteristic data to carry out next step model Foundation.
(2) study different Data Mining Classification methods to be combined with feature selecting algorithm, different malicious codes is selected Respective algorithms.
The selection of character subset is combined by it is critical only that of SDN malicious code feature selecting algorithm with grader, Judge which stack features or which feature can reach higher verification and measurement ratio by the performance of grader.Can consider to select allusion quotation The classifier algorithm of type, such as decision tree (DT), support vector machine (SVM) and K are adjacent to classification method (KNN), with above-mentioned Feature selecting algorithm combine, find out the feature selection sorting algorithm mated most, its flow process is as shown in Fig. 2.
By the front 8-12 dimensional feature sequence obtained of Fisher, ReliefF and InfoGain scheduling algorithm respectively with DT, SVM and KNN combine, and calculate the accuracy rate of its classification results, finally select be suitable for different sorting algorithm character subset and The feature selecting algorithm mated most.
(3) immunization strategy of viral communication in malicious code propagation model and SDN two mobility network is analyzed under SDN.
The centralized Control of SDN makes it be easier to find malicious code and Deviant Behavior, and can be abnormal to these rapidly Respond with aggressive behavior.Patent of the present invention, by setting up corresponding network model, introduces mobility threshold qc, analyzes SDN The logic of framework lower node moves propagates, to malicious code, the tendency influence brought.When certain class malicious code is in certain corporations' subnet During outburst, the controller of SDN may be employed isolation and rights management, when malicious code outburst in network, can take The mode of dynamic isolation suspected infection node and amendment network route and authorization policy reduces and avoids the propagation of malicious code.

Claims (4)

1. a malicious code detecting method based on SDN, proposes traffic characteristic choosing method based on OpenFlow, adopts With various features choosing method, different discharge characteristics is ranked up, finds out the Critical eigenvalues that can reflect malicious code, Realize Data Dimensionality Reduction;For different types of malicious code, different sorting algorithms and character subset is used to carry out the matching analysis, Find out matching characteristic subset and sorting technique that different types of Malicious Code Detection is analyzed;Realize SDN on this basis Flow redirects model and mobile network's EVOLUTION ANALYSIS, it is characterized in that:
(1) propose the secure data dimension reduction method that a kind of traffic characteristic based on OpenFlow is chosen, choose suitable flow special Property, carry out fine-grained data analysis, by higher-dimension (n dimension) characteristic dimensionality reduction, obtain the optimum low dimensional of all kinds of malicious code (m dimension) character subset;
(2) according to the Critical eigenvalues after dimensionality reduction, com-parison and analysis difference sorting technique and character subset are to inhomogeneity malice generation The classification performance of code, obtains optimal feature subset and the classification and matching algorithm of certain class malicious code;
(3) analyze in different network modeies, infect the node mobility of malicious code to it at source subnet and targeted subnet Infection conditions and the impact of explosion time, proposed a kind of malicious code propagation model in SDN mobile network, divided by theory Analysis and numerical simulation, find out malicious code and travel to the propagation characteristic of targeted subnet and the mobility of subnet intermediate node from source subnet Relation, analyze malicious code mobility threshold qc that spreads between corporations' subnet and propagate so that it is can reasonably reflect SDN The network dynamics new feature that new architecture brings.
Malicious code detecting method based on SDN the most according to claim 1, is characterized in that, based on OpenFlow The secure data dimension reduction method chosen of traffic characteristic, SDN based on stream table, stream table can serve as packet Joining rule, the structure of SDN stream table comprises three parts: packet header matching domain, enumerator and action, along with stream table designs various associations The support of view, mates more fine granularity, and its eigenvalue having also is increasing, and the feature selection of OpenFlow flow table is SDN The effective ways of safety in network data prediction, by reducing the dimension of traffic characteristic, can reduce what security association was analyzed Complexity, pay close attention to feature selection approach application in the switch stream table data of SDN, be respectively adopted Fisher, ReliefF, The traffic characteristic of OpenFlow flow table is ranked up by the feature selection approach such as mRMR, InfoGain, CFS, LVF, and according to not Same feature selecting algorithm is comprehensively analyzed, and selects effective traffic characteristic data to carry out the foundation of next step model.
Malicious code detecting method based on SDN the most according to claim 1, is characterized in that, inhomogeneity malice generation The optimal feature subset of code and optimal classification algorithms selection, different Network Abnormal scenes shows difference in discharge characteristic, and Different data mining algorithms is the most different for the matching degree of discharge characteristic, under patent of the present invention research SDN environment emphatically The combination of different feature selection approach and data mining algorithm processes, and analyzes after different feature selections Riming time of algorithm And the matching degree of different Feature Selection Algorithms and sorting algorithm performance, analyze and show that the abnormal flow for SDN flow divides Which key feature analysis should use to differentiate Traffic Anomaly under different scenes, causes the reason of abnormal flow to have a lot, than Such as DDOS attack, witty anthelmintic, slow scan etc., it shows in traffic characteristic and is not quite similar, by Fisher, ReliefF with And the front 8-12 dimensional feature sequence that obtains of InfoGain scheduling algorithm is combined with the sorting technique such as DT, SVM and KNN respectively, meter Calculate the accuracy rate of its classification results, find out matching characteristic value and sorting technique that different types of Malicious Code Detection is analyzed.
Malicious code detecting method based on SDN the most according to claim 1, is characterized in that, malicious code is at SDN Propagation characteristic analysis under mobile environment, sets up the network model under SDN environment;Network subnet is considered as corporations, subnet Inside is static corporations, and between subnet is dynamic corporations, and by analyzing in different network modeies, the node between corporations migrates Malicious code in source subnet and the infection conditions of targeted subnet and the impact of explosion time, is found under mobile environment, maliciously by rate The propagation of the code such as anthelmintic impact on network evolution, carries telephone net node or host node route test SDN controller For theoretical foundation.
CN201610315348.9A 2016-05-15 2016-05-15 Malicious code detecting method based on SDN network Expired - Fee Related CN105956473B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610315348.9A CN105956473B (en) 2016-05-15 2016-05-15 Malicious code detecting method based on SDN network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610315348.9A CN105956473B (en) 2016-05-15 2016-05-15 Malicious code detecting method based on SDN network

Publications (2)

Publication Number Publication Date
CN105956473A true CN105956473A (en) 2016-09-21
CN105956473B CN105956473B (en) 2018-11-13

Family

ID=56912536

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610315348.9A Expired - Fee Related CN105956473B (en) 2016-05-15 2016-05-15 Malicious code detecting method based on SDN network

Country Status (1)

Country Link
CN (1) CN105956473B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632279A (en) * 2018-05-08 2018-10-09 北京理工大学 A kind of multilayer method for detecting abnormality based on network flow
CN109194612A (en) * 2018-07-26 2019-01-11 北京计算机技术及应用研究所 A kind of network attack detecting method based on depth confidence network and SVM
CN110555305A (en) * 2018-05-31 2019-12-10 武汉安天信息技术有限责任公司 Malicious application tracing method based on deep learning and related device
CN110598128A (en) * 2019-09-11 2019-12-20 西安电子科技大学 Community detection method for large-scale network for resisting Sybil attack
CN111064706A (en) * 2019-11-25 2020-04-24 大连大学 Method for detecting spatial network data stream of mRMR-SVM
CN111556054A (en) * 2020-04-28 2020-08-18 南京大学 Method for detecting wormhole attack aiming at SDN
WO2022007581A1 (en) * 2020-07-10 2022-01-13 Kyndryl, Inc. Deep learning network intrusion detection

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021001236A1 (en) * 2019-06-30 2021-01-07 British Telecommunications Public Limited Company Impeding forecast threat propagation in computer networks

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003089923A2 (en) * 2002-04-17 2003-10-30 The Trustees Of Columbia University In The City Of New York A computational method for detecting remote sequence homology
US20090287621A1 (en) * 2008-05-15 2009-11-19 Eyal Krupka Forward feature selection for support vector machines
US20100063948A1 (en) * 2008-09-10 2010-03-11 Digital Infuzion, Inc. Machine learning methods and systems for identifying patterns in data
CN101604322B (en) * 2009-06-24 2011-09-07 北京理工大学 Decision level text automatic classified fusion method
CN103023725A (en) * 2012-12-20 2013-04-03 北京工业大学 Anomaly detection method based on network flow analysis
CN104243317A (en) * 2014-09-26 2014-12-24 杭州华三通信技术有限公司 Method and device for forwarding IP (internet protocol) routes

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003089923A2 (en) * 2002-04-17 2003-10-30 The Trustees Of Columbia University In The City Of New York A computational method for detecting remote sequence homology
US20090287621A1 (en) * 2008-05-15 2009-11-19 Eyal Krupka Forward feature selection for support vector machines
US20100063948A1 (en) * 2008-09-10 2010-03-11 Digital Infuzion, Inc. Machine learning methods and systems for identifying patterns in data
CN101604322B (en) * 2009-06-24 2011-09-07 北京理工大学 Decision level text automatic classified fusion method
CN103023725A (en) * 2012-12-20 2013-04-03 北京工业大学 Anomaly detection method based on network flow analysis
CN104243317A (en) * 2014-09-26 2014-12-24 杭州华三通信技术有限公司 Method and device for forwarding IP (internet protocol) routes

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
左青云: "基于OpenFlow的SDN网络安全分析与研究", 《信息网络安全》 *
巩永旺: "考虑个体行为的复杂网络病毒传播研究", 《中国博士学位论文全文数据库信息科技辑(月刊)》 *
肖甫: "SDN环境下基于KNN的DDoS攻击检测方法", 《南京邮电大学学报(自然科学版)》 *
解男男: "机器学习方法在入侵检测中的应用研究", 《中国博士学位论文全文数据库信息科技辑(月刊)》 *
郭春梅: "SDN网络技术及其安全性研究", 《信息网络安全》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632279A (en) * 2018-05-08 2018-10-09 北京理工大学 A kind of multilayer method for detecting abnormality based on network flow
CN110555305A (en) * 2018-05-31 2019-12-10 武汉安天信息技术有限责任公司 Malicious application tracing method based on deep learning and related device
CN109194612A (en) * 2018-07-26 2019-01-11 北京计算机技术及应用研究所 A kind of network attack detecting method based on depth confidence network and SVM
CN109194612B (en) * 2018-07-26 2021-05-18 北京计算机技术及应用研究所 Network attack detection method based on deep belief network and SVM
CN110598128A (en) * 2019-09-11 2019-12-20 西安电子科技大学 Community detection method for large-scale network for resisting Sybil attack
CN110598128B (en) * 2019-09-11 2022-08-09 西安电子科技大学 Community detection method for large-scale network for resisting Sybil attack
CN111064706A (en) * 2019-11-25 2020-04-24 大连大学 Method for detecting spatial network data stream of mRMR-SVM
CN111064706B (en) * 2019-11-25 2021-10-22 大连大学 Method for detecting spatial network data stream of mRMR-SVM
CN111556054A (en) * 2020-04-28 2020-08-18 南京大学 Method for detecting wormhole attack aiming at SDN
WO2022007581A1 (en) * 2020-07-10 2022-01-13 Kyndryl, Inc. Deep learning network intrusion detection
US11611588B2 (en) 2020-07-10 2023-03-21 Kyndryl, Inc. Deep learning network intrusion detection
GB2611189A (en) * 2020-07-10 2023-03-29 Kyndryl Inc Deep learning network intrusion detection

Also Published As

Publication number Publication date
CN105956473B (en) 2018-11-13

Similar Documents

Publication Publication Date Title
CN105956473A (en) Malicious code detection method based on SDN (Software Defined Networking)
Singh et al. Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions
Hajiheidari et al. Intrusion detection systems in the Internet of things: A comprehensive investigation
Cui et al. Towards DDoS detection mechanisms in software-defined networking
CN104836702B (en) Mainframe network unusual checking and sorting technique under a kind of large traffic environment
Nguyen et al. Proactive detection of DDoS attacks utilizing k-NN classifier in an anti-DDoS framework
Khashab et al. DDoS attack detection and mitigation in SDN using machine learning
Aleroud et al. Identifying DoS attacks on software defined networks: A relation context approach
US20220330027A1 (en) Detecting malicious threats in a 5G network slice
Gadallah et al. Machine Learning-based Distributed Denial of Service Attacks Detection Technique using New Features in Software-defined Networks.
Ma et al. DDoS detection for 6G Internet of Things: Spatial-temporal trust model and new architecture
Ozkan-Okay et al. SABADT: hybrid intrusion detection approach for cyber attacks identification in WLAN
Sundararajan et al. Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET
Hussain et al. A novel deep learning based intrusion detection system: Software defined network
Fenil et al. Towards a secure software defined network with adaptive mitigation of dDoS attacks by machine learning approaches
Shao et al. Cluster-based cooperative back propagation network approach for intrusion detection in MANET
Sharma et al. An effective dos prevention system to analysis and prediction of network traffic using support vector machine learning
Bolat-Akça et al. Software-Defined Intrusion Detection System for DDoS Attacks in IoT Edge Networks
Meddeb et al. An effective ids against routing attacks on mobile ad-hoc networks
Sivanesan et al. Detecting distributed denial of service (DDoS) in MANET using Ad Hoc on-demand distance vector (AODV) with extra tree classifier (ETC)
Ismail et al. A comparative study of datasets for cyber-attacks detection in wireless sensor networks
Ahmed et al. Enhancing Cybersecurity with Trust-Based Machine Learning: A Defense against DDoS and Packet Suppression Attacks
Alashhab et al. A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks. Symmetry 2022, 14, 1563
Baahmed et al. Using Graph Neural Networks for the Detection and Explanation of Network Intrusions
Zhu et al. A research review on SDN-based DDOS attack detection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 510665 Zhongshan Avenue, Guangdong, Tianhe District, No. 293, No.

Patentee after: GUANGDONG POLYTECHNIC NORMAL University

Address before: 510665 Zhongshan Avenue, Guangdong, Tianhe District, No. 293, No.

Patentee before: GUANGDONG POLYTECHNIC NORMAL University

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181113