CN110896360A - 基于历史信息和分层强化学习的拒绝服务攻击防护方法 - Google Patents
基于历史信息和分层强化学习的拒绝服务攻击防护方法 Download PDFInfo
- Publication number
- CN110896360A CN110896360A CN201911008958.4A CN201911008958A CN110896360A CN 110896360 A CN110896360 A CN 110896360A CN 201911008958 A CN201911008958 A CN 201911008958A CN 110896360 A CN110896360 A CN 110896360A
- Authority
- CN
- China
- Prior art keywords
- traffic
- router
- legal
- flow
- limiting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 91
- 230000002787 reinforcement Effects 0.000 title claims abstract description 12
- 238000004891 communication Methods 0.000 claims abstract description 23
- 238000004364 calculation method Methods 0.000 claims abstract description 5
- 230000000670 limiting effect Effects 0.000 claims description 36
- 238000013459 approach Methods 0.000 claims description 13
- 230000009471 action Effects 0.000 claims description 9
- 230000000694 effects Effects 0.000 claims description 8
- 238000012545 processing Methods 0.000 claims description 3
- 230000004044 response Effects 0.000 abstract description 16
- 239000003795 chemical substances by application Substances 0.000 description 22
- 238000002474 experimental method Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000004088 simulation Methods 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- 238000012549 training Methods 0.000 description 4
- 230000007123 defense Effects 0.000 description 3
- 230000001934 delay Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000003542 behavioural effect Effects 0.000 description 2
- 238000010367 cloning Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000012935 Averaging Methods 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000013434 data augmentation Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000012035 limiting reagent Substances 0.000 description 1
- 230000003278 mimic effect Effects 0.000 description 1
- 238000007430 reference method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/044—Network management architectures or arrangements comprising hierarchical management structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911008958.4A CN110896360B (zh) | 2019-10-23 | 2019-10-23 | 基于历史信息和分层强化学习的拒绝服务攻击防护方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911008958.4A CN110896360B (zh) | 2019-10-23 | 2019-10-23 | 基于历史信息和分层强化学习的拒绝服务攻击防护方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110896360A true CN110896360A (zh) | 2020-03-20 |
CN110896360B CN110896360B (zh) | 2022-03-15 |
Family
ID=69785837
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911008958.4A Active CN110896360B (zh) | 2019-10-23 | 2019-10-23 | 基于历史信息和分层强化学习的拒绝服务攻击防护方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110896360B (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112333110A (zh) * | 2020-10-30 | 2021-02-05 | 深圳壹账通智能科技有限公司 | 基于漏斗限流模型的请求验证处理方法及相关设备 |
CN114785693A (zh) * | 2022-06-24 | 2022-07-22 | 中国科学技术大学 | 基于分层强化学习的虚拟网络功能迁移方法及装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160028750A1 (en) * | 2014-07-23 | 2016-01-28 | Cisco Technology, Inc. | Signature creation for unknown attacks |
WO2017154012A1 (en) * | 2016-03-10 | 2017-09-14 | Telefonaktibolaget Lm Ericsson (Publ) | Ddos defence in a packet-switched network |
CN109639515A (zh) * | 2019-02-16 | 2019-04-16 | 北京工业大学 | 基于隐马尔可夫和Q学习协作的DDoS攻击检测方法 |
CN110011999A (zh) * | 2019-03-29 | 2019-07-12 | 东北大学 | 基于深度学习的IPv6网络DDoS攻击检测系统及方法 |
-
2019
- 2019-10-23 CN CN201911008958.4A patent/CN110896360B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160028750A1 (en) * | 2014-07-23 | 2016-01-28 | Cisco Technology, Inc. | Signature creation for unknown attacks |
WO2017154012A1 (en) * | 2016-03-10 | 2017-09-14 | Telefonaktibolaget Lm Ericsson (Publ) | Ddos defence in a packet-switched network |
CN109639515A (zh) * | 2019-02-16 | 2019-04-16 | 北京工业大学 | 基于隐马尔可夫和Q学习协作的DDoS攻击检测方法 |
CN110011999A (zh) * | 2019-03-29 | 2019-07-12 | 东北大学 | 基于深度学习的IPv6网络DDoS攻击检测系统及方法 |
Non-Patent Citations (5)
Title |
---|
E. C. AMADI; G.E.EHEDURU,F.U.EZE,C.IKERIONWU,K.C.OKAFO: ""Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming"", 《 2017 IEEE 4TH INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI)》 * |
E.C.AMADI,G.E.EHEDURU,F.U.EZE,C.IKERIONWU,H.O.AMUJI: ""A zero-sum mitigation game model for distributed denial of service attack using linear programming"", 《2017 IEEE 3RD INTERNATIONAL CONFERENCE ON ELECTRO-TECHNOLOGY FOR NATIONAL DEVELOPMENT (NIGERCON)》 * |
刘自豪,张斌,祝宁,唐慧林: ""基于改进AP聚类算法的自学习应用层DDoS检测方法"", 《计算机研究与发展》 * |
李传煌,吴艳,钱正哲,孙正君,王伟明: ""SDN下基于深度学习混合模型的DDoS攻击检测与防御"", 《通信学报》 * |
李传煌,孙正君,袁小雍,李晓林,龚梁,王伟明: ""基于深度学习的实时DDoS攻击检测"", 《电信科学》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112333110A (zh) * | 2020-10-30 | 2021-02-05 | 深圳壹账通智能科技有限公司 | 基于漏斗限流模型的请求验证处理方法及相关设备 |
CN114785693A (zh) * | 2022-06-24 | 2022-07-22 | 中国科学技术大学 | 基于分层强化学习的虚拟网络功能迁移方法及装置 |
CN114785693B (zh) * | 2022-06-24 | 2022-09-30 | 中国科学技术大学 | 基于分层强化学习的虚拟网络功能迁移方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN110896360B (zh) | 2022-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hurley et al. | HMM-based intrusion detection system for software defined networking | |
Duan et al. | Efficient random route mutation considering flow and network constraints | |
Ferriol-Galmés et al. | RouteNet-Fermi: Network modeling with graph neural networks | |
Sood et al. | Alleviating heterogeneity in SDN-IoT networks to maintain QoS and enhance security | |
Backes et al. | (Nothing else) MATor (s) monitoring the anonymity of Tor's path selection | |
CN110896360B (zh) | 基于历史信息和分层强化学习的拒绝服务攻击防护方法 | |
CN112749392A (zh) | 一种联邦学习中异常节点的检测方法及系统 | |
Dawood | Graph theory and cyber security | |
Zhang et al. | An intelligent route mutation mechanism against mixed attack based on security awareness | |
Saha et al. | Learning network traffic dynamics using temporal point process | |
Darir et al. | Mleflow: Learning from history to improve load balancing in tor | |
CN114095285A (zh) | 一种利用自适应扰动抵御网络侦察的方法和系统 | |
Nyberg et al. | Cyber threat response using reinforcement learning in graph-based attack simulations | |
Li et al. | The new threat to internet: DNP attack with the attacking flows strategizing technology | |
CN107454069B (zh) | 基于as安全联盟的域间路由系统拟态防护方法 | |
Lin et al. | ACO-BTM: a behavior trust model in cloud computing environment | |
Darir et al. | ProbFlow: Using Probabilistic Programming in Anonymous Communication Networks. | |
Seibert et al. | Newton: securing virtual coordinates by enforcing physical laws | |
Abdurohman et al. | Improving distributed denial of service (DDOS) detection using entropy method in software defined network (SDN) | |
Goohs et al. | Adversarial Knapsack and Secondary Effects of Common Information for Cyber Operations | |
Castelli et al. | Modeling the communication costs of content-based routing: the case of subscription forwarding | |
Koutiva et al. | An Agent-Based Modelling approach to assess risk in Cyber-Physical Systems (CPS) | |
Huang et al. | TNDP: Tensor-based network distance prediction with confidence intervals | |
Qi et al. | Game-theoretic analysis for security of various software-defined networking (SDN) architectures | |
Mikhailenko et al. | Analysis of the adaptive neural network router |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Pan Zhisong Inventor after: Xia Shiming Inventor after: Zhang Yanyan Inventor after: Zhang Lei Inventor after: Rao Rui Inventor after: Bai Wei Inventor after: Wang Chenyu Inventor before: Xia Shiming Inventor before: Pan Zhisong Inventor before: Zhang Yanyan Inventor before: Zhang Lei Inventor before: Rao Rui Inventor before: Bai Wei Inventor before: Wang Chenyu |
|
GR01 | Patent grant | ||
GR01 | Patent grant |