from: https://jyx.jyu.fi/bitstream/handle/123456789/52275/1/URN%3ANBN%3Afi%3Ajyu-201612125051.pdf

相关文献汇总如下:

S1 Eliseev and Gurina (2016) Algorithms for network server anomaly behavior detection without traffic content inspection ACM 1

S2 Zolotukhin et al. (2016b) Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic Scopus 1

S3 Zolotukhin et al. (2016a) Increasing Web Service Availability by Detecting Application-Layer DDoS Attacks in Encrypted Traffic IEEE, Scopus 1

S4 Zolotukhin et al. (2015) Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol Scopus 1

S5 Petiz et al. (2014) Detecting DDoS Attacks at the Source Using Multiscaling Analysis IEEE 1

S6 Wang et al. (2015) DDoS attack protection in the era of cloud computing and Software-Defined Networking ScienceDirect 1

S7 Hoeve (2013) Detecting Intrusions in Encrypted Control Traffic ACM 1

S8 Amoli and Hämäläinen (2013) A Real Time Unsupervised NIDS for Detecting Unknown and Encrypted Net- work Attacks in High Speed Network IEEE 1

S9i Das, Sharma, and Bhattacharyya (2011) Detection of HTTP Flooding Attacks in Multiple Scenarios ACM 0

S10i Shiaeles et al. (2012) Real time DDoS detection using fuzzy estimators ScienceDirect 0

S11 Chen, Chen, and Delis (2007) An Inline Detection and Prevention Framework for Distributed Denial of Service Attacks Scopus 1

S12i Lee et al. (2008) DDoS attack detection method using cluster analysis ScienceDirect 0

S13i Caulkins, Lee, and Wang (2005) A Dynamic Data Mining Technique for Intrusion Detection Systems ACM 0

S14 Abimbola, Shi, and Merabti (2003) NetHost-Sensor: A Novel Concept in Intrusion Detection Systems IEEE 0

加密的检测手段:

Table 11. Detection methods in encrypted networks from included studies Study

Detection method Strategy Features

[S1] Correlation functions & MLP Statistical analysis & Classification Server response rate metrics

[S2] Fuzzy c-means Fuzzy clustering Statistics and data from packet headers

[S3] Single-linkage, Kmeans, fuzzy c-means, SOM, DBSCAN & SAE Classification (NN) & clustering Statistics and data from packet headers

[S4] DBSCAN, K-means, k-NN, SOM, SVDD Clustering Packet header statistics

[S5] Multiscaling Analysis Statistical analysis Number of packets & average energy per timescale

[S6] Probabilistic inference graphical model Bayesian networks Chow-Liu algorithm for feature decision

[S7] Edit distance -based searching Statistical analysis & clustering time, size and direction of the packet

[S8] DBSCAN Statistical analysis & clustering Packet header and flow data in different resolutions

[S11] Signatures & stateful protocol analysis Signature & stateful protocol analysis TCP, UDP and ICMP packet headers and statistics as well as payload

[S14] Snort signatures Signature & system call sequence analysis packet payload

非加密的检测:

Table 12. Applicable methods from non-encrypted research in included studies Study

Detection method Strategy Features

[S9i] Statistical analysis, pattern disagreement and projected clustering Statistical analysis and clustering TCP header data & packet rate per interval

[S10i] Fuzzy estimator Statistical analysis Mean time between network packets

[S12i] Hierarchical clustering Clustering TCP header information & number of packets

[S13i] Classification tree Classification TCP header data

详细分析:

《Algorithms for network server anomaly behavior detection without traffic content inspection》目标是检测异常:

[S1] Eliseev and Gurina (2016) use correlation functions of data block size & number of packets per time unit observed from the webserver. They use long time intervals, i.e. three weeks of real data to train. They propose two algorithms. The first looks at the Pearson correlation coefficient between cross-correlation functions in a similar time interval in the current and training sets. The second algorithm uses a multilayer perceptron (MLP) with Levenberg-Marquardt algorithm to train and test the current cross-correlation functions. A threshold for the reconstruction error is set to determine an anomalous function. They say that these algorithms can be easily implemented as a lightweight DDoS HIDS in IoT devices. The method uses both statistical analysis and classification.

S2 Zolotukhin et al. (2016b) Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic Scopus 1

[S2] Zolotukhin et al. (2016b) propose a method for detecting DDoS attacks in encrypted network traffic in both offline and online case using fuzzy c-means clustering algorithm. In the method, they train the system with flow information such as conversation length, packet velocity, packet size averages, and flags. They build feature vectors form the information by also normalizing the values with min-max normalization. They have two different versions of the algorithm: an online and an offline version. The tests of the method are conducted using the Realistic Global Cyber Environment (RGCE), where the attacks can be simulated as realistically as possible. Slowloris, SSLsqueeze, and some advanced DDoS attacks were tested in the system and they found that the trivial cases such as Slowloris and SSLsqueeze were detected nearly 100% of the time, whereas the advanced DDoS attacks had only 70% accuracy when keeping the false positives to the minimum. Categorical classification of this method is clustering.

S3 Zolotukhin et al. (2016a) Increasing Web Service Availability by Detecting Application-Layer DDoS Attacks in Encrypted Traffic IEEE, Scopus 1

[S3] Zolotukhin et al. (2016a) study the application layer DDoS attacks in encrypted network traffic employing hierarchical, centroid- and density-based clustering algorithms and stacked auto-encoder (SAE). The features for clustering come from the packet header infor-mation and conversation to the server by each user. The conversations are mended together

from two different flows with matching sources and destinations. After this, statistics such
as the velocity of packets, extent, flags and the number of encrypted messages are extracted
into tuples for clustering. The tuples are normalized with max-min normalization. Using
the clustering methods described in Table 11, the most common DDoS attack types can are
detected by comparing the incoming flows to the clusters. In each of the type, a different
deviation measure is used. For example, for centroid-based algorithms, a threshold is set
for the maximum distance of the vector from the normal traffic cluster centers. The com-
mon DDoS attack types are Slowloris and Slow POST and a more advanced DDoS attack
mimicked the behavior of the users in a web service. This attack was detected by combining
conversations from the same source together, calculating the approximate similarity form
each cluster by percentages and applying the stacked auto-encoder. A reconstruction error
value of the SAE is the anomaly measure. The methods presented in this paper put the paper
in both classification and clustering categories.
 

S4 Zolotukhin et al. (2015) Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol Scopus 1

[S4] Zolotukhin et al. (2015) present a clustering-based anomaly-based detection method

using DBSCAN (density-based spatial clustering of applications with noise) and comparing
the algorithm with others such as SOM (Self-Organizing Map), K-means, k-Nearest Neigh-
bors and Support Vector Data Description (SVDD). The features for training and testing data
use only packet header statistics such as the averages of packet sizes or TTL (Time to live),
TCP flag appearance averages, no name a few. The feature vectors are min-max normalized(聚类常用).
If the pairwise distance from the nearest cluster member is more than the maximal pairwise
distance for that cluster, it is labeled as an anomaly. The method is categorized in clustering
methods because of the various clustering algorithms used in the detection.
 

S5 Petiz et al. (2014) Detecting DDoS Attacks at the Source Using Multiscaling Analysis IEEE 1

[S5] Petiz et al. (2014) propose a statistical analysis detection method in the source network
that uses a multiple scale traffic analysis. The statistics used as the features are statistics
of the packets flows. Thus they conclude that this method is also applicable to encrypted
traffic. The detection method is based on the premise that DDoS attacks have a pseudo-
periodicity fingerprint in the traffic. By calculating an average energy for packets per second
from multiple time intervals, the anomalous traffic should have higher energy in one interval
length. This paper is an example of a purely statistical analysis of network metrics.
 

S6 Wang et al. (2015) DDoS attack protection in the era of cloud computing and Software-Defined Networking ScienceDirect 1

[S6] Wang et al. (2015) develop a complete NIDS with detection and mitigation modules for
software-defined networks (SDN). Their detection method is based on probabilistic inference
graphical model that updates itself all the time in order to fight a data-shift issue, unlike
traditional Bayesian networks. The data shift issue assumes that the training data and real
attacks imitate the same statistical frequency (Wang et al. 2015, 313). The features are not
preselected by the researchers but by a Chow-Liu algorithm. They are selected from flows
or packet headers. After applying the algorithm, commonly the relevant variables have been
linked to the Chow-Liu tree. These are chosen for the analysis of the graphical model. The
graphical model is an adaptation from Bayesian networks. Thus the category for this paper
is in BN.
 

S7 Hoeve (2013) Detecting Intrusions in Encrypted Control Traffic ACM 1——感觉这种方法比较有效,先按照报文统计进行聚类,相同类别计算报文的编辑距离来判断内容相似性。

[S7] Hoeve (2013) explore an intrusion detection method for encrypted control traffic. A

packet series search and comparison using edit distance is the measure of the difference
between the series. The method uses time, size and direction of the packet to form the
feature vector. Traffic consists of series of these vectors. The training phase is done by a
clustering the series into clusters. The next phase searches for series with approximate string
matching and edit distance. The series which are over a set threshold, are malicious. This
method uses both statistical methods and clustering. Thus these are the categories.
 

S8 Amoli and Hämäläinen (2013) A Real Time Unsupervised NIDS for Detecting Unknown and Encrypted Net- work Attacks in High Speed Network IEEE 1——没懂。。。

[S8] Amoli and Hämäläinen (2013) have designed an NIDS to work with large amounts of

data. The method first employs an algorithm that uses statistical analysis to detect varia-
tions in the flows(how?). If an anomaly is detected, the second phase with DBSCAN starts. The
outliers from the final set of clusters are flagged as anomalous and a potential DDoS attack.
Thresholds for the DBSCAN, the minimum size of the clusters is set to 5% of the number of
flows and the maximum distance between vectors shall be fixed to the average Mahalanobis
distance of the vectors. From the anomalous traffic, the starts to pinpoint the attacker from
C&C traffic patterns. Because of the two different phases, the category of this paper is in
both statistical analysis and clustering.
 

S9i Das, Sharma, and Bhattacharyya (2011) Detection of HTTP Flooding Attacks in Multiple Scenarios ACM 0

[S9i] Das, Sharma, and Bhattacharyya (2011) have developed a three-phased method for de-
tecting DDoS flooding attacks. The first phase uses a simple threshold value for the number
of HTTP requests per interval. The second takes advantage of parallel time interval request
rates and computes a pattern disagreement value. The maximum of this value during a time
with no known attacks is considered as the threshold for anomalous traffic. The third method
uses packet header data and projected clustering with Oracles SQL queries. They create an
index to determine the type of the cluster either malicious or normal. The first two are online
and the last is an offline detection method. This paper belongs to both statistical analysis and
clustering-based groups.
 

S10i Shiaeles et al. (2012) Real time DDoS detection using fuzzy estimators ScienceDirect 0

[S10i] Shiaeles et al. (2012) propose a detection method that uses the packets arrival times

in small time windows. It is assumed that DDoS attacks mean packet arrival does not follow
the Poisson distribution. An α-cuts fuzzy estimator is used to derive a single fuzzy value for
the mean arrival times in the earlier time window. Then the current mean time is compared to
the value. If the value is less than the fuzzy value, an alarm is raised. If it is more, the traffic
is considered to be normal. They note that flash crowd events might be flagged as DDoS
attacks using this method. I chose to include this paper, as the method does not require any
payload inspection and could be utilized as a detection method in encrypted network traffic.
This method is based on a statistical analysis.
 

S11 Chen, Chen, and Delis (2007) An Inline Detection and Prevention Framework for Distributed Denial of Service Attacks Scopus 1

[S11] Chen, Chen, and Delis (2007) have developed an NIDS, called
DDoS Container , that uses several detection methods in succession to detect DDoS attacks from network traffic.
They consciously acknowledge that their method does not fully comply with encrypted net-
work traffic, but say that the behavioral analysis of the stateful inspection does also catch
flows that are encrypted. As stated in Table 11, the method combines both stateful protocol
analysis and signature-based payload inspection. The system is placed in the network, and
it has been placed in a segment where all the traffic flows through between two switches,
presumably before or in the DMZ (Demilitarized zone). The system comprises of multiples
phases of detection, whose names are Protocol Decoder, Behavior Police, Session Corre-
lator, Message Sequencer, Traffic Distinguisher, and Traffic Arbitrator. The first three take
care of the stateful protocol analysis and the latter three of the more careful packet inspection
using signatures. At the beginning only the header information of the packet is taken into
account, and therefore it is possible to detect malicious flows with abnormal behavior also in
encrypted traffic. Thus, this paper is in both stateful protocol analysis and signature-based
detection classes.
 

S12i Lee et al. (2008) DDoS attack detection method using cluster analysis ScienceDirect 0

[S12i] Lee et al. (2008) propose a hierarchical clustering-based detection method that uses
various entropy values and other metrics calculated from the packet header information as the
features. The vectors are normalized by standard deviation before clustering. Euclidean dis-
tance is used as the measure of similarity. The method is purely a clustering-based method.
 

S13i Caulkins, Lee, and Wang (2005) A Dynamic Data Mining Technique for Intrusion Detection Systems ACM 0

[S13i] Caulkins, Lee, and Wang (2005) use a decision tree to detect DDoS attacks. The
learning phase was done in a supervised manner from the known attacks of DARPA1999
IDEVAL dataset. Only the TCP packet header information was taken into account.(为啥没有使用tcp报文的data呢?) The
decision tree classifies connections into either intrusive or normal classes. This is a categor-
ically classification-based method.
 
S14 Abimbola, Shi, and Merabti (2003) NetHost-Sensor: A Novel Concept in Intrusion Detection Systems IEEE 0
[S14] Abimbola, Shi, and Merabti (2003) discuss the difficulty of signature-based systems
and encrypted network traffic. They propose a host-based IDS where they can access the
payload of the encrypted traffic. The HIDS lies right after the application layer and detects
DDoS attacks using signatures for network traffic packet payload and analyzes the system
calls of the target application. The, categorically signature and system call analysis -based,
paper is the first included in the mapping study that notifies the difficulties of analyzing
encrypted network traffic and consciously researches the field.

https ddos检测——研究现状的更多相关文章

  1. CC 攻击检测研究现状

    网络层ddos 是让去往银行的道路交通变得拥堵,无法使正真要去银行的人到达:常利用协议为网络层的,如tcp(利用三次握手的响应等待及电脑tcp 连接数限制)等应用层ddos 则是在到达银行后通过增办. ...

  2. 大数据DDos检测——DDos攻击本质上是时间序列数据,t+1时刻的数据特点和t时刻强相关,因此用HMM或者CRF来做检测是必然! 和一个句子的分词算法CRF没有区别!

    DDos攻击本质上是时间序列数据,t+1时刻的数据特点和t时刻强相关,因此用HMM或者CRF来做检测是必然!——和一个句子的分词算法CRF没有区别!注:传统DDos检测直接基于IP数据发送流量来识别, ...

  3. 语义SLAM研究现状总结

    博客转载自:https://blog.csdn.net/xiaoxiaowenqiang/article/details/81051010 原文标题:深度学习结合SLAM 语义slam 语义分割 端到 ...

  4. 全球知名的HTTPS网站检测工具-Qualys SSL Labs

    推荐一个在线版全球知名的HTTPS网站检测工具-Qualys SSL Labs.Qualys SSL Labs同时也是很具有影响力的SSL安全和性能研究机构. SSL Labs会对HTTPS网站的证书 ...

  5. VR的国内研究现状及发展趋势

    转载请声明转载地址:http://www.cnblogs.com/Rodolfo/,违者必究. 一.国内研究现状 我国虚拟现实技术研究起步较晚,与发达国家还有一定的差距. 随着计算机图形学.计算机系统 ...

  6. NLP+语篇分析(五)︱中文语篇分析研究现状(CIPS2016)

    摘录自:CIPS2016 中文信息处理报告<第三章 语篇分析研究进展.现状及趋势>P21 CIPS2016 中文信息处理报告下载链接:http://cips-upload.bj.bcebo ...

  7. NLP+语义分析(四)︱中文语义分析研究现状(CIPS2016、角色标注、篇章分析)

    摘录自:CIPS2016 中文信息处理报告<第二章 语义分析研究进展. 现状及趋势>P14 CIPS2016> 中文信息处理报告下载链接:http://cips-upload.bj. ...

  8. RNA测序研究现状与发展

    RNA测序研究现状与发展 1 2,584 A+ 所属分类:Transcriptomics   收  藏 通常来说,某一个物种体内所有细胞里含有的DNA都应该是一模一样的,只是因为每一种细胞里所表达的R ...

  9. https ddos攻击——由于有了认证和加解密 后果更严重 看绿盟的产品目前对于https的ddos cc攻击需要基于内容做检测

    如果web服务器支持HTTPS,那么进行HTTPS洪水攻击是更为有效的一种攻击方式,一方面,在进行HTTPS通信时,web服务器需要消耗更多的资源用来进行认证和加解密,另一方面,一部分的防护设备无法对 ...

随机推荐

  1. Integer.valueof 和 Integer.parseInt

    System.out.println(Integer.valueOf("127")==Integer.valueOf("127")); System.out.p ...

  2. Mac/OSX上安装xshell

    xshell没有mac版,且不愿意仅为一个程序运行一个虚拟机.怎么办?装上wine个来跑shell吧! 1.安装 WineBottler 过程略(制作.管理windows程序,类似CrossOver) ...

  3. spark2.1.1创建Pipeline

    Pipeline 为流程,是Spark创建机器学习的一个流程控制的类 下面直接贴出创建的代码,以及整个流程 第一种: import org.apache.spark.ml.{Pipeline, Pip ...

  4. (转) SpringBoot非官方教程 | 第十一篇:springboot集成swagger2,构建优雅的Restful API

    swagger,中文“拽”的意思.它是一个功能强大的api框架,它的集成非常简单,不仅提供了在线文档的查阅,而且还提供了在线文档的测试.另外swagger很容易构建restful风格的api,简单优雅 ...

  5. 1.2 Getting Started--Naming Conventions(命名约定)

    Ember.js使用一个运行时解析器去连接你的对象而没有很多样板文件.作为一个开发者,如果你把code放到约定好的位置这个解析器会自动工作.   一.The Application     1. 当你 ...

  6. 2018-2019 ICPC, NEERC, Southern Subregional Contest (Online Mirror, ACM-ICPC Rules, Teams Preferred) Solution

    A. Find a Number Solved By 2017212212083 题意:$找一个最小的n使得n % d == 0 并且 n 的每一位数字加起来之和为s$ 思路: 定义一个二元组$< ...

  7. Terminal(终端) 在 OS X下如何快速调用

    Terminal(终端) 在 OS X下如何快速调用 转载请注明原作者:文章如果对您有所启发或帮助,不介意您请我喝一杯咖啡 ​ Terminal作为人机交流中极其重要的一部分,无论是在Windows. ...

  8. Flux 单向数据流

    Flux 的核心就是一个简单的约定:视图层组件不允许直接修改应用状态,只能触发 action.应用的状态必须独立出来放到 store 里面统一管理,通过侦听 action 来执行具体的状态操作. 所谓 ...

  9. javascript模式(2)--模块模式

    在nodeJs中,可以定义自己的模块,然后通过exports来暴露API.一般是这么写的:模块依赖,私有成员和要暴露的对象.在原生js中也可以有类似的写法来组织自己的代码.可以提供一个松耦合.结构清晰 ...

  10. zabbix-2.4.7环境部署与初始化安装

    一.zabbix简介: zabbix的特点: - 安装与配置简单,学习成本低 - 支持多语言(包括中文) - 免费开源 - 自动发现服务器与网络设备 - 分布式监视以及WEB集中管理功能 - 可以无a ...