The Detection and Orientation Method to DRDoS Attack Based on Fuzzy Association Rules
نویسندگان
چکیده
DDoS (Distributed Denial of Service) attack is being the most extensive danger and difficulty to defense. A new kind of DDoS attack named DRDoS (Distributed Reflector Denial of Service) appears in recent years, which is more dangerous than DDoS attack because it is in stronger disguise. In this paper, the principle of DRDoS attack is studied and the network traffic is analyzed by fuzzy association rules with path restricted when DRDoS attack happens. And the association rules about spoofed network traffic and attack network traffic are mined. Also the DRDoS Attack Defensive Architecture based on Multi-Agent (DAMA) is set up in order to realize the detection, orientation and defensive function. DAMA is validated by NS-2 platform. It can detect and orient the attack source in a short time, realize screening the attack source and stop transmitting attack traffic. The experimental result proves that DAMA can find out the attack, orient the attack source and hold out the attack effectively.
منابع مشابه
Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection
Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...
متن کاملEdge Detection Based On Nearest Neighbor Linear Cellular Automata Rules and Fuzzy Rule Based System
Edge Detection is an important task for sharpening the boundary of images to detect the region of interest. This paper applies a linear cellular automata rules and a Mamdani Fuzzy inference model for edge detection in both monochromatic and the RGB images. In the uniform cellular automata a transition matrix has been developed for edge detection. The Results have been compared to the ...
متن کاملEdge Detection Based On Nearest Neighbor Linear Cellular Automata Rules and Fuzzy Rule Based System
Edge Detection is an important task for sharpening the boundary of images to detect the region of interest. This paper applies a linear cellular automata rules and a Mamdani Fuzzy inference model for edge detection in both monochromatic and the RGB images. In the uniform cellular automata a transition matrix has been developed for edge detection. The Results have been compared to the ...
متن کاملCARD (Continuous and Random Dropping) based DRDOS Attack Detection and Prevention Techniques in MANET
The DDOS is “distributed-denial-of-service” meaning many “zombies or daemons” computers performing a DOS (Denial of Service) attack on one computer, usually directed by one “master”. In MANETs, DOS attacks not only consume the scarce system resources, such as bandwidth, battery energy, or CPU cycles, but also isolate legitimate users from a network. The DOS attacks may impact the network connec...
متن کاملAutonomous Parallel Parking of a Car Based on Parking Space Detection and Fuzzy Controller
This paper develops an automatic parking algorithm based on a fuzzy logic controller with the vehicle pose for the input and the steering angle for the output. In this way some feasible reference trajectory path have been introduced according to geometric and kinematic constraints and nonholonomic constraints to simulate motion path of car. Also a novel method is used for parking space detec...
متن کامل