Real-time attacks blind detection and analysis algorithm of mobile internet network

Attack detection algorithms of large scale mobile internet network need the prior information of attack behaviors or supervised learning to attack behaviors, so these algorithms is not real time and applicable, a real-time attacks blind detection and analysis algorithm of mobile internet network is...

Full description

Bibliographic Details
Main Authors: Shi Erying, Wang Zheng
Format: Article
Language:zho
Published: National Computer System Engineering Research Institute of China 2018-03-01
Series:Dianzi Jishu Yingyong
Subjects:
Online Access:http://www.chinaaet.com/article/3000079315
id doaj-36574d2bcfd24f8a9608eda5c7c945c2
record_format Article
spelling doaj-36574d2bcfd24f8a9608eda5c7c945c22020-11-24T21:37:59ZzhoNational Computer System Engineering Research Institute of ChinaDianzi Jishu Yingyong0258-79982018-03-01443899310.16157/j.issn.0258-7998.1723143000079315Real-time attacks blind detection and analysis algorithm of mobile internet networkShi Erying0Wang Zheng1Changzhou Vocational Institute of Mechatronic Technology,Changzhou 213164,ChinaSchool of Electronic Science and Engineering,Nanjing University,Nanjing 210093,ChinaAttack detection algorithms of large scale mobile internet network need the prior information of attack behaviors or supervised learning to attack behaviors, so these algorithms is not real time and applicable, a real-time attacks blind detection and analysis algorithm of mobile internet network is proposed to handle that problems. Firstly, the largest eigenvalues for all time frames are extracted, the attack behaviors of each time frame are detected by analysis combined largest eigenvalues with model order. Then, the types of detections are analyzed by eigenvalues analysis technique, and the variations details of the eigenvalues are identified. Lastly, similarity analysis schema are designed to analyze the detail information, such as port count and time. Simulation results based on the real experiment and public network traffic dataset show that the proposed algorithm realizes a good attack detection accuracy.http://www.chinaaet.com/article/3000079315mobile internet networkattack detectionnetwork safetymodel order selectiondistributed denial of serviceport scan attack
collection DOAJ
language zho
format Article
sources DOAJ
author Shi Erying
Wang Zheng
spellingShingle Shi Erying
Wang Zheng
Real-time attacks blind detection and analysis algorithm of mobile internet network
Dianzi Jishu Yingyong
mobile internet network
attack detection
network safety
model order selection
distributed denial of service
port scan attack
author_facet Shi Erying
Wang Zheng
author_sort Shi Erying
title Real-time attacks blind detection and analysis algorithm of mobile internet network
title_short Real-time attacks blind detection and analysis algorithm of mobile internet network
title_full Real-time attacks blind detection and analysis algorithm of mobile internet network
title_fullStr Real-time attacks blind detection and analysis algorithm of mobile internet network
title_full_unstemmed Real-time attacks blind detection and analysis algorithm of mobile internet network
title_sort real-time attacks blind detection and analysis algorithm of mobile internet network
publisher National Computer System Engineering Research Institute of China
series Dianzi Jishu Yingyong
issn 0258-7998
publishDate 2018-03-01
description Attack detection algorithms of large scale mobile internet network need the prior information of attack behaviors or supervised learning to attack behaviors, so these algorithms is not real time and applicable, a real-time attacks blind detection and analysis algorithm of mobile internet network is proposed to handle that problems. Firstly, the largest eigenvalues for all time frames are extracted, the attack behaviors of each time frame are detected by analysis combined largest eigenvalues with model order. Then, the types of detections are analyzed by eigenvalues analysis technique, and the variations details of the eigenvalues are identified. Lastly, similarity analysis schema are designed to analyze the detail information, such as port count and time. Simulation results based on the real experiment and public network traffic dataset show that the proposed algorithm realizes a good attack detection accuracy.
topic mobile internet network
attack detection
network safety
model order selection
distributed denial of service
port scan attack
url http://www.chinaaet.com/article/3000079315
work_keys_str_mv AT shierying realtimeattacksblinddetectionandanalysisalgorithmofmobileinternetnetwork
AT wangzheng realtimeattacksblinddetectionandanalysisalgorithmofmobileinternetnetwork
_version_ 1725936063183060992