• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Zihao, Zhang Bin, Zhu Ning, Tang Huilin. Adaptive App-DDoS Detection Method Based on Improved AP Algorithm[J]. Journal of Computer Research and Development, 2018, 55(6): 1236-1246. DOI: 10.7544/issn1000-1239.2018.20170124
Citation: Liu Zihao, Zhang Bin, Zhu Ning, Tang Huilin. Adaptive App-DDoS Detection Method Based on Improved AP Algorithm[J]. Journal of Computer Research and Development, 2018, 55(6): 1236-1246. DOI: 10.7544/issn1000-1239.2018.20170124

Adaptive App-DDoS Detection Method Based on Improved AP Algorithm

More Information
  • Published Date: May 31, 2018
  • As it is complicated for training samples and difficult for updating models in behavior-based application layer DDoS detection methods, an adaptive App-DDoS detection method based on improved affinity propagation (IAP) algorithm is proposed. Firstly, to optimize the affinity propagation algorithm, we previously divide the dataset into several parts utilizing the limited priori knowledge, and merge the similar clusters for enhancing the ability of processing large amount of data. Besides, the abnormal clusters cleaning mechanism is introduced so as to avoid their interference for the detection results. Secondly, some user behavior attributes are given to represent behavior features, and the improved AP algorithm is applied to efficiently clustering the proposed attributes, as a result, improving the detection rate for abnormal users. Then by evaluating the quality of clusters with Silhouette index in real-time, a self-updating learning mechanism is put forward to support the resistance of analyzing the distribution of normal users’ attributions, which further reduces the false positive rate and increases the detection rate. The experimental results on real dataset, ClerkNet-Http, show that the proposed method is more effective and more accurate compared with the conventional AP algorithm and KMPCA algorithm, as well as can update clusters by itself in the process of detection.
  • Related Articles

    [1]Gao Han, Luo Juan, Cai Qianya, Zheng Yanliu. An Intelligent Traffic Signal Coordination Method Based on Asynchronous Decision-Making[J]. Journal of Computer Research and Development, 2023, 60(12): 2797-2805. DOI: 10.7544/issn1000-1239.202220773
    [2]Wang Qi, Li Deyu, Zhai Yanhui, Zhang Shaoxia. Parameterized Fuzzy Decision Implication[J]. Journal of Computer Research and Development, 2022, 59(9): 2066-2074. DOI: 10.7544/issn1000-1239.20210539
    [3]Zhang Chao, Li Deyu. Interval-Valued Hesitant Fuzzy Graphs Decision Making with Correlations and Prioritization Relationships[J]. Journal of Computer Research and Development, 2019, 56(11): 2438-2447. DOI: 10.7544/issn1000-1239.2019.20180314
    [4]Liu Linlan, Zhang Jiang, Shu Jian, Guo Kai, Meng Lingchong. Multiple Attribute Decision Making-Based Prediction Approach of Critical Node for Opportunistic Sensor Networks[J]. Journal of Computer Research and Development, 2017, 54(9): 2021-2031. DOI: 10.7544/issn1000-1239.2017.20160645
    [5]Yu Haiquan, Si Guangya, Yang Zhimou, Luo Pi. The Scene Simulation of Crowd Behaviors Oriented to Strategic Decision-Making[J]. Journal of Computer Research and Development, 2010, 47(6): 1020-1025.
    [6]Zhai Junhai, Wang Xizhao, Zhang Sufang. Integration of Multiple Fuzzy Decision Trees Based on Fuzzy Integral[J]. Journal of Computer Research and Development, 2009, 46(3): 470-477.
    [7]Mu Chengpo, Huang Houkuan, Tian Shengfeng, Li Xiangjun. A Survey of Intrusion Response Decision-Making Techniques of Automated Intrusion Response Systems[J]. Journal of Computer Research and Development, 2008, 45(8): 1290-1298.
    [8]Jiang Yuncheng, Tang Yong, Wang Ju, Shen Yuming. A Tableaux Decision Procedure for Fuzzy Description Logic FALNUI[J]. Journal of Computer Research and Development, 2007, 44(8): 1309-1316.
    [9]Hu Xiaojian, Yang Shanlin, Hu Xiaoxuan, Fang Fang. Optimal Decomposition of Decision Table Systems Based on Bayesian Networks[J]. Journal of Computer Research and Development, 2007, 44(4): 667-673.
    [10]Lin Zhigui, Xu Lizhong, Yan Xijun, Huang Fengchen, Liu Yingping. A Decision-Making Method on D-S Evidence Fusion Information Based on Distance Measure[J]. Journal of Computer Research and Development, 2006, 43(1): 169-175.
  • Cited by

    Periodical cited type(5)

    1. 谢汶兵,田雪,漆锋滨,武成岗,王俊,罗巧玲. 二进制翻译技术综述. 软件学报. 2024(06): 2687-2723 .
    2. 刘登峰,李东亚,柴志雷,周浩杰,丁海峰. 基于QEMU的SIMD指令替换浮点指令框架. 湖南大学学报(自然科学版). 2024(08): 70-77 .
    3. 余子濠 ,陈璐 ,孙凝晖 ,包云岗 . 以RISC-V为目标的动态二进制翻译代码质量优化方法. 计算机研究与发展. 2023(10): 2322-2334 . 本站查看
    4. 李明亮,庞建民,岳峰. 基于地址重用的二进制翻译本地代码替换. 信息工程大学学报. 2022(01): 38-44 .
    5. 李男,庞建民. 基于中间表示规则替换的二进制翻译中间代码优化方法. 国防科技大学学报. 2021(04): 156-162 .

    Other cited types(2)

Catalog

    Article views (1071) PDF downloads (590) Cited by(7)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return