Please wait a minute...
Computer & Telecommunication  2024, Vol. 1 Issue (6): 35-    DOI: 1008-6609(2024)06-0035-05
Current Issue | Archive | Adv Search |
DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network 
1. Institute of Disaster Prevention 2. Mineral Resources Information Center of CMGB
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  In recent years, network security is facing increasing challenges, among which Distributed Denial of Service (DDoS) attack is a common form of network threats. In order to deal with this challenge, this paper proposes a DDoS attack detection method based on Multi-scale Convolutional Neural Network (MSCNN). The model is trained on the CICDDoS2019day1 dataset, and the model detection performance is tested on the CICDDoS2019day2 dataset. By using MSCNN to predict and classify network tra?c, DDoS attacks can be e?ectively identi?ed and false positive rate can be reduced. Experiments show that the MSCNN method is superior to DNN, CNN and LSTM in terms of accuracy, recall and F1 score performance metrics.
Key wordsDDoS attack      multi-scale convolutional neural network      network security      deep learning      
Published: 01 November 2024

Cite this article:

LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network . Computer & Telecommunication, 2024, 1(6): 35-.

URL:

https://www.computertelecom.com.cn/EN/1008-6609(2024)06-0035-05     OR     https://www.computertelecom.com.cn/EN/Y2024/V1/I6/35

[1] JIN Yan. Research on DDoS Attack Detection Technology based on SDN [J]. 电脑与电信, 2024, 1(6): 26-30.
[2] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[3] ZHANG Zhi-yuan. DDoS Attack Detection Method on Application Layer Based on Clustering[J]. 电脑与电信, 2021, 1(7): 25-28.
[4] LAI Jin-zhi.
Research and Practice of Network Security Management of Industrial Control System
Based on PDCA Circulation
[J]. 电脑与电信, 2021, 1(11): 12-15.
[5] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[6] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[7] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[8] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[9] ZHONG Yu-ming CHEN Chang-hui. Exploration of Network and Information Security[J]. 电脑与电信, 2020, 1(5): 33-35.
[10] ZHOU Xiao-juan. Discussion on the Computer Network Security and Preventive Measures in the Era of Big Data[J]. 电脑与电信, 2020, 1(3): 41-43.
[11] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
[12] ZHANG Yu. Application of DES File Encryption in Network Security[J]. 电脑与电信, 2019, 1(7): 49-.
[13] JIANG Lin-zhou. Man-in-the-middle Attack and Defense Methods in Wireless Networks[J]. 电脑与电信, 2019, 1(5): 48-50.
[14] YE Zheng-qiang , LI Jia . Design and Deployment of Enterprise Network Security Scheme[J]. 电脑与电信, 2018, 1(1-2): 53-54.
[15] FAN Miao-miao. Analysis of WSN Network Security Management Mechanism[J]. 电脑与电信, 2018, 1(12): 84-86.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd