Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (92)
  • Open Access

    ARTICLE

    A DDoS Attack Situation Assessment Method via Optimized Cloud Model Based on Influence Function

    Xiangyan Tang1, Qidong Zheng1,*, Jieren Cheng1,2, Victor S. Sheng3, Rui Cao1, Meizhu Chen1

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1263-1281, 2019, DOI:10.32604/cmc.2019.06173

    Abstract The existing network security situation assessment methods cannot effectively assess the Distributed denial-of-service (DDoS) attack situation. In order to solve these problems, we propose a DDoS attack situation assessment method via optimized cloud model based on influence function. Firstly, according to the state change characteristics of the IP addresses which are accessed by new and old user respectively, this paper defines a fusion feature value. Then, based on this value, we establish a V-Support Vector Machines (V-SVM) classification model to analyze network flow for identifying DDoS attacks. Secondly, according to the change of new and old IP addresses, we propose… More >

  • Open Access

    ARTICLE

    An Abnormal Network Flow Feature Sequence Prediction Approach for DDoS Attacks Detection in Big Data Environment

    Jieren Cheng1,2, Ruomeng Xu1,*, Xiangyan Tang1, Victor S. Sheng3, Canting Cai1

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 95-119, 2018, DOI:10.3970/cmc.2018.055.095

    Abstract Distributed denial-of-service (DDoS) is a rapidly growing problem with the fast development of the Internet. There are multitude DDoS detection approaches, however, three major problems about DDoS attack detection appear in the big data environment. Firstly, to shorten the respond time of the DDoS attack detector; secondly, to reduce the required compute resources; lastly, to achieve a high detection rate with low false alarm rate. In the paper, we propose an abnormal network flow feature sequence prediction approach which could fit to be used as a DDoS attack detector in the big data environment and solve aforementioned problems. We define… More >

Displaying 91-100 on page 10 of 92. Per Page