Please wait a minute...
Computer & Telecommunication  2021, Vol. 1 Issue (7): 25-28    DOI: 1008-6609(2021)07-0025-04
Current Issue | Archive | Adv Search |
DDoS Attack Detection Method on Application Layer Based on Clustering
Jincheng Vocational and Technical College
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  
This paper proposes a clustering- based DDoS attack detection method for application layer. Firstly, the method collects web server network traffic, and selects four attributes to form the traffic feature vector after data preprocessing. Then, the K-means clustering algorithm optimized by particle swarm optimization is used to establish the detection model, and the attack behavior is identified through the model. Experimental results show that this method can effectively identify DDoS attacks in application layer and has higher detection rate compared with k-means algorithm.
Key wordsapplication layer      DDoS attack      clustering     
Published: 15 October 2021

Cite this article:

ZHANG Zhi-yuan. DDoS Attack Detection Method on Application Layer Based on Clustering. Computer & Telecommunication, 2021, 1(7): 25-28.

URL:

https://www.computertelecom.com.cn/EN/1008-6609(2021)07-0025-04     OR     https://www.computertelecom.com.cn/EN/Y2021/V1/I7/25

[1] HUANG He-lie HUANG Ge-wen CHEN Zhi-hua YAO Zu-fa. Improved Sparrow Search Algorithm for Hybrid Flow-shop Scheduling Problem with Peak Clipping Demand Response [J]. 电脑与电信, 2024, 1(6): 16-.
[2] JIN Yan. Research on DDoS Attack Detection Technology based on SDN [J]. 电脑与电信, 2024, 1(6): 26-30.
[3] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[4] ZHANG An-qi ZHANG Na. Graph Embedding Based on Neighbor Similarity for Community Detection[J]. 电脑与电信, 2024, 1(5): 79-.
[5] CAO Cong-hui LAN Qiang HOU Qun QI Wei-min . Research on Extraction Technology Based on Remote Learning[J]. 电脑与电信, 2021, 1(8): 1-5.
[6] LI Hui-fang ZHONG Xin-cheng FU Xiao-li. Research on the Detection of Abnormal Behavior of College StudentsBased on Density Peak Clustering[J]. 电脑与电信, 2021, 1(3): 26-29.
[7] SONG Tian-shu, LI Jiang-yu, ZHANG Qin-zhe. Research on Personal Microblog Clustering Based on CBOW Model[J]. 电脑与电信, 2018, 1(4): 69-72.
[8] WEI Shuang. An Enhanced Data Mining Method for Text Clustering[J]. 电脑与电信, 2018, 1(3): 46-48.
[9] Chen Ping. Analysis of Network Learning Behavior Data Based on Clustering Technology[J]. 电脑与电信, 2017, 1(4): 31-33.
[10] LI Yan-mei. An Improvement Algorithm Based on Global K- means Clustering[J]. 电脑与电信, 2017, 1(11): 25-27.
[11] CHEN Min-tao, KUANG Fang-jun. Research on the Application of Data Mining Technology in Medical Big Data[J]. 电脑与电信, 2017, 1(11): 34-36.
[12] CHEN Shuang-quan. Research on Video Content Recognition Based on Clustering Algorithm[J]. 电脑与电信, 2017, 1(11): 44-46.
[13] Chen Lin. An Improved GHSOMAlgorithm for Text Clustering[J]. 电脑与电信, 2016, 1(5): 57-61.
[14] Xu Yong. Research on Content Recognition Based on Clustering Algorithm[J]. 电脑与电信, 2016, 1(11): 39-41.
[15] Zhang Xiaoyan Hua Ying . Research on Methods of Text Mining and Its Application [J]. , 2011, 1(12): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd