Real-time attacks blind detection and analysis algorithm of mobile internet network
Attack detection algorithms of large scale mobile internet network need the prior information of attack behaviors or supervised learning to attack behaviors, so these algorithms is not real time and applicable, a real-time attacks blind detection and analysis algorithm of mobile internet network is...
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
National Computer System Engineering Research Institute of China
2018-03-01
|
Series: | Dianzi Jishu Yingyong |
Subjects: | |
Online Access: | http://www.chinaaet.com/article/3000079315 |
id |
doaj-36574d2bcfd24f8a9608eda5c7c945c2 |
---|---|
record_format |
Article |
spelling |
doaj-36574d2bcfd24f8a9608eda5c7c945c22020-11-24T21:37:59ZzhoNational Computer System Engineering Research Institute of ChinaDianzi Jishu Yingyong0258-79982018-03-01443899310.16157/j.issn.0258-7998.1723143000079315Real-time attacks blind detection and analysis algorithm of mobile internet networkShi Erying0Wang Zheng1Changzhou Vocational Institute of Mechatronic Technology,Changzhou 213164,ChinaSchool of Electronic Science and Engineering,Nanjing University,Nanjing 210093,ChinaAttack detection algorithms of large scale mobile internet network need the prior information of attack behaviors or supervised learning to attack behaviors, so these algorithms is not real time and applicable, a real-time attacks blind detection and analysis algorithm of mobile internet network is proposed to handle that problems. Firstly, the largest eigenvalues for all time frames are extracted, the attack behaviors of each time frame are detected by analysis combined largest eigenvalues with model order. Then, the types of detections are analyzed by eigenvalues analysis technique, and the variations details of the eigenvalues are identified. Lastly, similarity analysis schema are designed to analyze the detail information, such as port count and time. Simulation results based on the real experiment and public network traffic dataset show that the proposed algorithm realizes a good attack detection accuracy.http://www.chinaaet.com/article/3000079315mobile internet networkattack detectionnetwork safetymodel order selectiondistributed denial of serviceport scan attack |
collection |
DOAJ |
language |
zho |
format |
Article |
sources |
DOAJ |
author |
Shi Erying Wang Zheng |
spellingShingle |
Shi Erying Wang Zheng Real-time attacks blind detection and analysis algorithm of mobile internet network Dianzi Jishu Yingyong mobile internet network attack detection network safety model order selection distributed denial of service port scan attack |
author_facet |
Shi Erying Wang Zheng |
author_sort |
Shi Erying |
title |
Real-time attacks blind detection and analysis algorithm of mobile internet network |
title_short |
Real-time attacks blind detection and analysis algorithm of mobile internet network |
title_full |
Real-time attacks blind detection and analysis algorithm of mobile internet network |
title_fullStr |
Real-time attacks blind detection and analysis algorithm of mobile internet network |
title_full_unstemmed |
Real-time attacks blind detection and analysis algorithm of mobile internet network |
title_sort |
real-time attacks blind detection and analysis algorithm of mobile internet network |
publisher |
National Computer System Engineering Research Institute of China |
series |
Dianzi Jishu Yingyong |
issn |
0258-7998 |
publishDate |
2018-03-01 |
description |
Attack detection algorithms of large scale mobile internet network need the prior information of attack behaviors or supervised learning to attack behaviors, so these algorithms is not real time and applicable, a real-time attacks blind detection and analysis algorithm of mobile internet network is proposed to handle that problems. Firstly, the largest eigenvalues for all time frames are extracted, the attack behaviors of each time frame are detected by analysis combined largest eigenvalues with model order. Then, the types of detections are analyzed by eigenvalues analysis technique, and the variations details of the eigenvalues are identified. Lastly, similarity analysis schema are designed to analyze the detail information, such as port count and time. Simulation results based on the real experiment and public network traffic dataset show that the proposed algorithm realizes a good attack detection accuracy. |
topic |
mobile internet network attack detection network safety model order selection distributed denial of service port scan attack |
url |
http://www.chinaaet.com/article/3000079315 |
work_keys_str_mv |
AT shierying realtimeattacksblinddetectionandanalysisalgorithmofmobileinternetnetwork AT wangzheng realtimeattacksblinddetectionandanalysisalgorithmofmobileinternetnetwork |
_version_ |
1725936063183060992 |