CN110896360A - 基于历史信息和分层强化学习的拒绝服务攻击防护方法 - Google Patents
基于历史信息和分层强化学习的拒绝服务攻击防护方法 Download PDFInfo
- Publication number
- CN110896360A CN110896360A CN201911008958.4A CN201911008958A CN110896360A CN 110896360 A CN110896360 A CN 110896360A CN 201911008958 A CN201911008958 A CN 201911008958A CN 110896360 A CN110896360 A CN 110896360A
- Authority
- CN
- China
- Prior art keywords
- traffic
- router
- legitimate
- team
- leg
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 99
- 230000002787 reinforcement Effects 0.000 title claims abstract description 12
- 230000000670 limiting effect Effects 0.000 claims abstract description 31
- 238000004364 calculation method Methods 0.000 claims abstract description 5
- 238000004891 communication Methods 0.000 claims description 21
- 230000009471 action Effects 0.000 claims description 11
- 230000000694 effects Effects 0.000 claims description 8
- 238000012545 processing Methods 0.000 claims description 4
- 230000007704 transition Effects 0.000 claims description 2
- 230000004044 response Effects 0.000 abstract description 16
- 230000006870 function Effects 0.000 description 7
- 238000002474 experimental method Methods 0.000 description 5
- 238000012549 training Methods 0.000 description 4
- 238000012360 testing method Methods 0.000 description 3
- 230000003542 behavioural effect Effects 0.000 description 2
- 238000010367 cloning Methods 0.000 description 2
- 230000007123 defense Effects 0.000 description 2
- 230000001934 delay Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000013434 data augmentation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/044—Network management architectures or arrangements comprising hierarchical management structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911008958.4A CN110896360B (zh) | 2019-10-23 | 2019-10-23 | 基于历史信息和分层强化学习的拒绝服务攻击防护方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911008958.4A CN110896360B (zh) | 2019-10-23 | 2019-10-23 | 基于历史信息和分层强化学习的拒绝服务攻击防护方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110896360A true CN110896360A (zh) | 2020-03-20 |
CN110896360B CN110896360B (zh) | 2022-03-15 |
Family
ID=69785837
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911008958.4A Active CN110896360B (zh) | 2019-10-23 | 2019-10-23 | 基于历史信息和分层强化学习的拒绝服务攻击防护方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110896360B (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112333110A (zh) * | 2020-10-30 | 2021-02-05 | 深圳壹账通智能科技有限公司 | 基于漏斗限流模型的请求验证处理方法及相关设备 |
CN114785693A (zh) * | 2022-06-24 | 2022-07-22 | 中国科学技术大学 | 基于分层强化学习的虚拟网络功能迁移方法及装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160028750A1 (en) * | 2014-07-23 | 2016-01-28 | Cisco Technology, Inc. | Signature creation for unknown attacks |
WO2017154012A1 (en) * | 2016-03-10 | 2017-09-14 | Telefonaktibolaget Lm Ericsson (Publ) | Ddos defence in a packet-switched network |
CN109639515A (zh) * | 2019-02-16 | 2019-04-16 | 北京工业大学 | 基于隐马尔可夫和Q学习协作的DDoS攻击检测方法 |
CN110011999A (zh) * | 2019-03-29 | 2019-07-12 | 东北大学 | 基于深度学习的IPv6网络DDoS攻击检测系统及方法 |
-
2019
- 2019-10-23 CN CN201911008958.4A patent/CN110896360B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160028750A1 (en) * | 2014-07-23 | 2016-01-28 | Cisco Technology, Inc. | Signature creation for unknown attacks |
WO2017154012A1 (en) * | 2016-03-10 | 2017-09-14 | Telefonaktibolaget Lm Ericsson (Publ) | Ddos defence in a packet-switched network |
CN109639515A (zh) * | 2019-02-16 | 2019-04-16 | 北京工业大学 | 基于隐马尔可夫和Q学习协作的DDoS攻击检测方法 |
CN110011999A (zh) * | 2019-03-29 | 2019-07-12 | 东北大学 | 基于深度学习的IPv6网络DDoS攻击检测系统及方法 |
Non-Patent Citations (5)
Title |
---|
E. C. AMADI; G.E.EHEDURU,F.U.EZE,C.IKERIONWU,K.C.OKAFO: ""Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming"", 《 2017 IEEE 4TH INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI)》 * |
E.C.AMADI,G.E.EHEDURU,F.U.EZE,C.IKERIONWU,H.O.AMUJI: ""A zero-sum mitigation game model for distributed denial of service attack using linear programming"", 《2017 IEEE 3RD INTERNATIONAL CONFERENCE ON ELECTRO-TECHNOLOGY FOR NATIONAL DEVELOPMENT (NIGERCON)》 * |
刘自豪,张斌,祝宁,唐慧林: ""基于改进AP聚类算法的自学习应用层DDoS检测方法"", 《计算机研究与发展》 * |
李传煌,吴艳,钱正哲,孙正君,王伟明: ""SDN下基于深度学习混合模型的DDoS攻击检测与防御"", 《通信学报》 * |
李传煌,孙正君,袁小雍,李晓林,龚梁,王伟明: ""基于深度学习的实时DDoS攻击检测"", 《电信科学》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112333110A (zh) * | 2020-10-30 | 2021-02-05 | 深圳壹账通智能科技有限公司 | 基于漏斗限流模型的请求验证处理方法及相关设备 |
CN114785693A (zh) * | 2022-06-24 | 2022-07-22 | 中国科学技术大学 | 基于分层强化学习的虚拟网络功能迁移方法及装置 |
CN114785693B (zh) * | 2022-06-24 | 2022-09-30 | 中国科学技术大学 | 基于分层强化学习的虚拟网络功能迁移方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN110896360B (zh) | 2022-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Duan et al. | Efficient random route mutation considering flow and network constraints | |
Liu et al. | Traffic engineering with forward fault correction | |
AlSabah et al. | The path less travelled: Overcoming Tor’s bottlenecks with traffic splitting | |
Park et al. | Robust path diversity for network quality of service in cyber-physical systems | |
Huang et al. | A differential game approach to decentralized virus-resistant weight adaptation policy over complex networks | |
Wu et al. | On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks | |
CN110602062B (zh) | 基于强化学习的网络主动防御方法及装置 | |
CN114095285B (zh) | 一种利用自适应扰动抵御网络侦察的方法和系统 | |
CN110896360B (zh) | 基于历史信息和分层强化学习的拒绝服务攻击防护方法 | |
Kim et al. | BottleNet: Hiding network bottlenecks using SDN-based topology deception | |
CN111786967A (zh) | DDoS攻击的防御方法、系统、节点及存储介质 | |
CN107454069B (zh) | 基于as安全联盟的域间路由系统拟态防护方法 | |
Jiang et al. | KimeraPAD: A Novel Low-Overhead Real-Time Defense Against Website Fingerprinting Attacks Based on Deep Reinforcement Learning | |
Lu et al. | Network security situation awareness based on network simulation | |
Liu et al. | Concurrent multipath traffic impersonating for enhancing communication privacy | |
Wang et al. | Design of the Congestion Control for TCP/AQM Network with Time‐Delay | |
Xu et al. | A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection | |
Hwang et al. | A resilient buffer allocation scheme in active queue management: a stochastic cooperative game theoretic approach | |
Azath et al. | Improving fairness in network traffic by controlling congestion and unresponsive flows | |
Niu et al. | A linear matrix inequality based attack detection approach for networked control systems | |
Khazan et al. | A distributed attack simulation for quantitative security evaluation using SimEvents | |
Kumar et al. | Game theoretical defense mechanism against bandwidth based DDoS attacks | |
BASYONI | Enhancing the performance and security of anonymous communication networks | |
Huang et al. | Break-Pad: effective padding machines for tor with break burst padding | |
Kumar et al. | Impact of loss synchronization on reliable high speed networks: A model based simulation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Pan Zhisong Inventor after: Xia Shiming Inventor after: Zhang Yanyan Inventor after: Zhang Lei Inventor after: Rao Rui Inventor after: Bai Wei Inventor after: Wang Chenyu Inventor before: Xia Shiming Inventor before: Pan Zhisong Inventor before: Zhang Yanyan Inventor before: Zhang Lei Inventor before: Rao Rui Inventor before: Bai Wei Inventor before: Wang Chenyu |
|
GR01 | Patent grant | ||
GR01 | Patent grant |