Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1)
  • Open Access

    ARTICLE

    A DDoS Attack Situation Assessment Method via Optimized Cloud Model Based on Influence Function

    Xiangyan Tang1, Qidong Zheng1,*, Jieren Cheng1,2, Victor S. Sheng3, Rui Cao1, Meizhu Chen1

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1263-1281, 2019, DOI:10.32604/cmc.2019.06173

    Abstract The existing network security situation assessment methods cannot effectively assess the Distributed denial-of-service (DDoS) attack situation. In order to solve these problems, we propose a DDoS attack situation assessment method via optimized cloud model based on influence function. Firstly, according to the state change characteristics of the IP addresses which are accessed by new and old user respectively, this paper defines a fusion feature value. Then, based on this value, we establish a V-Support Vector Machines (V-SVM) classification model to analyze network flow for identifying DDoS attacks. Secondly, according to the change of new and old IP addresses, we propose… More >

Displaying 1-10 on page 1 of 1. Per Page