• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A DDoS Attack Situation Assessment Method via Optim ized Cloud Model Based on Influence Function

    2019-11-25 10:22:58XiangyanTangQidongZhengJierenChengVictorShengRuiCaoandMeizhuChen
    Computers Materials&Continua 2019年9期

    Xiangyan Tang,Qidong Zheng, ,Jieren Cheng,2,Victor S.Sheng,Rui Cao and Meizhu Chen

    Abstract:The existing network security situation assessment methods cannot effectively assess the Distributed denial- of -service (DDoS) attack situation.In order to solve these problems,we propose a DDoS attack situation assessment method via optimized cloud model based on influence function.Firstly,according to the state change characteristics of the e IP addresses which are accessed by new and old user respectively,this paper defines a fusion feature value.Then,based on this value,we establish a V-Support Vector Machines(V-SVM) classification model to analyze network flow for identifying DDoS attacks.Secondly,according to the change of new and old IP addresses,we propose three evaluation indexes.Furthermore,we propose index weight calculation algorithm to measure the importance of different indexes.According to the fusion index,which is optimized by the weighted algorithm,we define the Risk Degree (RD) and calculate the RD value of each network node.Then we obtain the situation information of the whole network according to the RD values,which are from each network nodes with different weights.Finally,the whole situation information is classified via cloud model to quantitatively assess the DDoS attack situation.The experimental results show that our method can not only improve the detection rate and reduce the missing rate of DDoS attacks,but also access the DDoS attack situation effectively.This method is more accurate and flexible than the existing methods.

    Keywords:DDoS attack,V-SVM,influence function,cloud model.

    1 Introduction

    With the rapid rise of industries such as the Internet of Things,cloud computing,and big data,the global informationization process has been greatly promoted.These new technologies have brought innovation vitality to economic and social development,and at the same time,traditional network security protection faces serious threats and new challenges.Among the various types of security threats,the danger of DDoS attacks is especially serious.By controlling multiple puppet machines in different locations on the network to attack the victim simultaneously,the attacker uses asymmetry of resources to produce plenty of attack flow,causing abnormal service,thereby preventing legitimate users from accessing the network normally [Idhammad,Afdel and Belouch (2018)].According to the data provided by Tencent Cloud in 2018,the large-flow DDoS attacks in the first half of 2018 continued to increase [Teng,Liu,Liu et al.(2019)].Among them,Memcached DDoS has sprung up everywhere,with a reflection magnification of up to 50,000 and a peak of up to 1.7 Tbps of attack traffic,which has become a new focus of the e network security community.As one of the most important security threats the Internet faces,frequent DDoS attacks which leaded to major economic losses in the whole society.However,traditional single defense devices or detection devices are unable to meet security requirements.Different security factors can be integrated by the network security situation evaluation technology,dynamically reflect the network security status as a whole,and provide a reliable reference for enhancing network security.Therefore,the security situation assessment model and key technologies for the network have become the research hotspots at field of network security.

    The rest of the paper is organized as follows:the second part is the related work of network security situation assessment at home and abroad in recent years;the third part introduces the extraction of network flow attack features and the identification of attacks;the fourth part is the establishment of the assessment indexes and the optimization by the influence function;the fifth part is the assessment method via cloud model;the sixth part is the specific experiment and the analysis of experimental results.The seventh part is the conclusion of this article,and the last part is the reference.

    2 Related works

    Endsley proposed the concept of Situation Assessment (SA) firstly [Endsley (1988)].Then,Tim Bass applied the concept of SA at field of network security for the first time,and proposed the concept of network security situation assessment [Bass (2000)].

    In recent years,researchers from different countries have made some progress in this field and have obtained some research results.Zhao et al.[Zhao and Liu (2018)] used wavelet neural network algorithm which is based on particle swarm method,and obtained situational awareness context value in big data environment.The algorithm had fast convergence and good adaptability.Pu [Pu (2018)] used dynamic Bayesian networks to evaluate the attack effects of network nodes,whose method was more accurate and efficient than traditional node importance assessment methods.Xu et al.[Xu,Cao and Ren (2017)] proposed an IoT network security situation assessment model which is based on semantic ontology.The perception of this method was more comprehensive,and the ability was more powerful than the traditional network security situational awareness method.Liu et al.[Liu,Dong and Lv(2017)] proposed the confidence-based situation awareness method,which uses integrated learning algorithm and D-S evidence theory to calculate confidence of attack and combines various situational elements to obtain situation information.

    Lounis [Lounis (2018)] proposed a stochastic security evaluation method which used a tree model to establish related security scenarios,then used a stochastic model to evaluate security situation.Alali et al.[Alali,Almogren,Hassan et al.(2018)] used the fuzzy reasoning method to generate security assessment results that were based on four assessment indexes and conducted various analyses on these factors,the model could better assess system risk.Jana et al.[Jana and Ghosh (2018)] proposed a novel interval controller of fuzzy logic which improved the evaluation model about network risk,and improved the possibility of predicting network security risk assessment.Fan et al.[Fan,Xiao and Nayak(2017)] established a risk situation evaluation model through S of tware Defined Network(SDN),analyzed the features of the e common network attacks and Address Resolution Protocol (ARP) attack,and calculated the risk values of SDN via Hidden Markov Model(HMM).The network status can also be predicted by the proposed approach based on HMM.Dai et al.[Dai,Hu and Zheng (2017)] proposed a risk flow attack graph to construct a network assessment model to assess network risk whose method is capable of identifying network security situations effectively.Liu et al.[Liu,Zhang,Zhu et al.(2017)] put forward a hierarchical network menace situation evaluation method that was via D-S evidence method to assess the influence of DDoS attacks on the network,this method divided four layers,collection,extraction,fusion and assessment,DDoS attacks effect can be better reflected by the proposed method on the network security menace situation.

    Liu et al.[Liu,Wang and Lu (2016)] proposed a fusion-based control model of evaluation in network security situation,which provided new methods and means for monitoring and managing networks.Wu et al.[Wu,Liu and Xu (2016)] used the complex network theory to model the Security Situation Awareness (SSA) data,which could mine current data's features more effectively.Li et al.[Li and Zhao (2016)] proposed a method to obtain observations value through sliding time window,then through Multiple Population Genetic Algorithm (MPGA) for obtaining HMM parameters,thus improved the reliability of parameters.Zhang et al.[Zhang,Cheng,Tang et al.(2018)] proposed one algorithm to evaluate situation of DDoS,which improved Fuzzy C-means clustering algorithm.Sara et al.[Sara,Jose and Skarmeta (2018)] to solve problems of large-scale Internet of Things deployment,proposed a security certification method which was designed for IoT,this method could evaluate the security grade of a device automatically.Jordan et al.[Jordan and Niall (2018)] used Real-Time Dynamic Network Anomaly (ReTiNA) to combine anomalies on each edge of the network graph and then performed situational awareness across the whole network.Zhong et al.[Zhong,Lin,Liu et al.(2018)] proposed the data triage working retrieval system which can achieved cyber situational evaluation in Security Operations Center (SOC).This system can provide on-the-job advice for novice analysts.Yusuf et al.[Yusuf,Ge,Hong et al.(2018)] used a Temporal Hierarchical Attack Representation method to assess security index,when the status of systems changes,the indexes also changes.The results provide some insights about security indicators under network changes.

    Zahid-Hasan et al.[Zahid-Hasan,Zubair-Hasan and Sattar (2018)] used the Deep Convolution Neural Network for detecting DoS attack,this model is more effective than K-Nearest Neighbor (KNN).Cheng et al.[Cheng,Xu,Tang et al.(2018)] aim to deal with DDoS detection problems in big data environment,put an abnormal network flow characteristic prediction method forward,this method can identify DDoS attack better and solve the problem of compute resources consumption.Kshira et al.[Kshira,Deepak,Mayank et al.(2018)] applied information distance as a measurement in DDoS detecting which based on logically centralized controller,this method improved the detection accuracy.Khundrakpam et al.[Khundrakpam and Tanmay (2017)] applied for multi-layer perceptron and inherited algorithm in detecting DDoS attacks in application layer analysis.

    This method provided the minimum error compared to others traditional methods.Cheng et al.[Cheng,Zhou,Liu et al.(2018)] used the method of multi-protocol-fusion to define usual network flows and used Autoregressive Integrated Moving Average (ARIMA) to detect DDoS attack.Sabrina et al.[Sabrina,Alessandra,Daniele et al.(2018)] proposed a risk evaluation technology to assess dynamic and static components of an IoT system,this method was based on end-to-end systems.Alireza et al.[Alireza,Saygin,HungDa et al.(2018)] presented a method to use the game theory method to solve network security problems,this method could be applied for other area.Jin et al.[Jin,Simon,Dong et al.(2018)] put forward a different series of indexs to assess the Moving Target Defense technology,these indexs could of fer direction in choosing the best effective Moving Target Defense (MTD) technology.

    3 A DDoS attack detection based on V-SVM

    3.1 Features extracting

    Given a normal network flowUwithnsamples and a network flowVwithmsamples which need to be detected,this paper define each sample as (Ti,Si,Di),whereTirepresents the arrival time of packeti,Sidenote its source IP andDirepresents the destination IP.This paper uses the normal network flowUto train a model which identifies the network flowV,in the process of training and detection,the parameterΔtis the same.After the above definition,during the training process,at the end of thek-thΔt,we will take out the IP packet of the network flow sample corresponding to the whole period from the normal network flowU,and define it asGk.And for each IP packet inGk,if the IP address contained in the IP packet is invalid,the IP packet will be thrown away fromGk.We will define the sample group after filtering asFk.As getting eachFk,we gradually establish a set of IP addresses O,which represents the old users of the e current network.In the firstΔttime period,we merge all source IP addresses S inF1into the IP addresses O,and the maximum number of old users isOmax=Subsequently,the number of old users ofFkcalculated for thek-th (k>1)time isFk∩O,then we update the maximum number of old usersFinally,after calculating theOmax,we put each source IP address inFkinto IP addresses set O.By repeating this operation,we can get a maximum value that represents the old user in a specific time period.While updating ofOmax,we also need to calculate the number of new users in this time periodNk=||Fk||-||Fk∩O||.Since we already know that the setFk∩Orepresents old user,and the setFk?Odenotes new user at this time interval,Nkdenotes the number of new users.In the same way,we can also calculate the average number ofNin perΔtperiod asAfter above calculation,we have got four model parameters,the network flow detection operation could be started.We readVwithΔtas above,in every sample interval,we define the dictionaryWk[Sk,i] denotes the number of visitor of source IPSk,iduring each k-th time period.When everyΔtbe finished,we could get four parameters in k-th time period.And then they are defined as below.

    In Eq.(1),Bkdenotes a ratio of old IPs that appeared at present time interval k over the maximum number of old IPs in certain k intervals.Mkrepresents the changes in the number of new users in the current time interval k relative with number of average new IPs.Lkdenotes a percentage of the new user to the old user in current time interval k.DKdenotes accessing ratio of new user,more specifically,the feature value refers to the number of visitors of per new user in per second during the k time period.

    From actual experience,our old users will be accessed in a relatively fixed mode when the network is normal.This access mode can be used as a priori condition for DDoS attack identification.Assume thatOmax= 400 during training process,then if |Gk∩O| =200 old users in the detection flow,and the result of the calculation isIt could represent the maximum value ofOmaxcompared to the old users,the percentage of current old users is increased or decreased.

    Based on the definitions of DDoS,it is assumed that there should be many new users in the network flow under the DDoS attack.So||Gk?O||is assumed more bigger than the number of new IPs under general conditions,the feature valueMis a change amount indicating the average value of new IPs learned in the current time period relative to the new user learned in the training set.

    Supposing that attack is taking place,there is a reason to speculate current number of new IPs||Gk?O||is bigger than current number of old IPs.But there may be only a few old IPs and little new IPs appear.At this condition,supposing new IPs more than old IPs,thewill cause fluctuation.Therefore,the ratio of new IPs currently found in maximum number of the old IPs in the training is used asL.Based onMandL,if a DDoS attack occurs,the accessing ratio of the new IPs will be a great value because the network will receive many flooded packets from the attacker.In the normal flow or network congestion,because each normal user will abide by the TCP/IP protocol,the access rateDwill be a relatively small constant value.

    Due to the way the eigenvalues are calculated,it is important to avoid any eigenvalues be 0.Therefore,the calculation methods ofBkandLkare improved.

    WithinBk,Mk,LkandDkhave defined above,the product of them is calculated by us firstly,we then take the product's negative value which is defined asBMLDk.

    3.2 Attack recognition based on V-SVM

    The support vector machine approach is based on statistical learning's VC dimension theory and the rule of morphological risk minimization.According to message of finite samples,it looks for the most excellent compromise between the model’s complexity and the learning capability to acquire the best promotion capability.Compared with other machine learning algorithms such as neural network,decision tree and Adaboost,SVM classifier has simpler structure design,moderate computational complexity and better generalization performance.It shows a lot of great pluses in dealing with small sample,high and nonlinear dimensional pattern recognition.Mu et al.[Mu and Nandi (2005)]proposed a V-SVM that added a parameter V that could manage support vectors and error vectors in numbers.So as to show value of the parameter V and enhance the detection ratio of DDoS attacks and decrease false negative ratio,this paper used V-SVM method to detect DDoS attack.

    Most of the classification problems existing in real life are nonlinear.The support vector machine method is to choose a kernel function for nonlinear expansion.According to the actual problem and the research object,choosing the appropriate kernel function of ten plays a decisive role in the classification effect of the model.Under the conditions of Linear,Polynomial,Radial Basis Function,and Sigmoid four different types of kernel functions,the first two dimensions of the e partial training set are selected for visualization.The red and green marks represent the normal sample points and the abnormal sample points respectively,and the black marks indicate the support vectors.As shown in Fig.1,the impact of the kernel function on the decision hyperplane position is visually reflected.Compared to other kernel functions,this paper chose RBF kernel function,because the RBF kernel function has the highest classification accuracy and the lowest false negative rate.

    Although the parameter V controls the number of support vectors and error vectors very well,however,due to the difference in the specific objectsoftraining and the different degrees of influence of each feature on the classification results,the expected detection results may not be achieved.At present,there is no uniform set of best methods for the selection of V values at home and abroad.Based on the specific data,this paper analyzed the impact of artificial experience value V on DDoS attack detection,thus selected the appropriate V value.

    Figure1:Schematic diagram of V-SVM classification under different types of kernel functions

    The detection method is as shown in Fig.2 below.Firstly,the data set is analyzed,the appropriate features are selected,and the training set is normalized and reduced.The second step is to construct various SVM classification models,and study the process of classification model parameters and kernel function parameters optimization.The third step is to initialize the training model,import the training set to start the training of the model,the original issue is changed into a convex optimization issue,then the lagrangian function is constructed,the original problem is dualized and the kernel function is selected,the optimal solution α is solved by solving the dual problem through the Sequential Mini Optimization (SMO) algorithm,and then the optimal solutions w and b of the problem are solved.Finally,we obtain hyperplane and classification decision function.

    The last step,the constructed classification model is tested by a data set containing unknown tags,we analyzed the experimental results.The SMO algorithm is different from the SVMalgorithm,which is a heuristic type algorithm.When the solution of each variable in the algorithm reaches the Karush-Kuhn-Tucker (KKT) requirement for the optimization problem,the solution can be found.

    Figure2:DDoS attack detection process

    4 Assessment index optim ized by influence function

    4.1 Assessment index

    Based on the above detection results,this paper began to evaluate the impact of the DDoS attack.Because DDoS attack situations are multiple factors,ambiguity and subjective judgement,this paper quantifies the original qualitative evaluation,and then proposed three indexs as follow.

    On the one hand,under normal conditions,the number of new IP that accesses the website is small,because the users who access the website are basically old users.When a DDoS attack occurs,there will be accompanied by the emergence of a large number of new IP,so the rate of the number of new IP at time of attack to the maximum number of new IP at the normal time is a very meaningful value.So this paper propose New IP Ratio (NIR),the formula is as follows:

    whereNIindicates the number of addresses for different new IP that change over time when a DDoS attack occurs,andNmaxindicates the maximum number of new IP under normal conditions.NIRindicates the relative strength of the attack,that is,the degree of change of the attack new IP relative to the normal new IP maximum value relative to the normal conditions.For example,when a large number of new IP appear,it cannot be said that this is an attack,or it may be a network congestion or a hot event.So using relative values can better describe the changes in the new IP when an attack occurs.

    In addition,when an attack occurs that will cause denial of service,that is,attacker convey lots of IP packets to the victim,but it does not accept the third handshake,so the network flow with no return can be defined as a One-Way-Flow (OWF).When an attack occurs,the attack strength will increase with time going by,and the IP packets sent by the attacker will gradually increase.So we can define the absolute strength of the attack as follow:

    whereDFIindicates different packets in One-Way-Flow of new IP,SADindicates the service abnormality degree,that is,the number of packets of new IP increases with time,which can be used to measure the absolute strength of DDoS.

    Under normal conditions,the number of old IP is generally larger than the new IP.When a DDOS attack occurs,the number of new IP gradually increases,while the number of old IP gradually decreases.To express the dynamics between the new and old IP,we defined the following formula:

    whereNIindicates the number of addresses for different new IP that change over time when a DDoS attack occurs,ODindicates the dynamic change in the number of old users’IP addresses,ANFrepresents the ratio of addresses of different new IP to addresses of different old IP.

    4.2 Influence function

    The influence function is an important concept in robust statistics.It describes the degree of influence of a single outlier on the statistic,and reflects the variation of the statistic of the model distribution when it is polluted by the unit.The statistical approach provides a new perspective and provides a simple and flexible tool for robust statistics.For the first time,Koh et al.[Koh and Liang (2017)] applied influence function in machine learning.The learning algorithm tracks the prediction of the model and returns its training data,so that it can find the part of the training data that has the greatest impact on a given prediction.Because the weights ofNIR,SADandANFare different,we can use influence function to assign weights to them.

    The formula that influence function is defined as follows:

    5 Assessment method based on cloud model

    5.1 Risk Degree

    We define the Risk Degree (RD) which means the degree of risk of the system under ddos attack,the formula is as follows:

    This value is used to assess the risk level of each network node.Classify theRDof each network node fusion,which is classified into normal,low-risk,medium-risk and high-risk.Then,the four levels of each network node are merged,and then the level is divided into four levels,which indicate that the whole network node status is normal,slightly affected,serious damaged and devastated.

    Because the importance of each network node is different,this paper set the weight of each node to α1,α2,…,αn.For backbone nodes,the weight will be larger.If the asset of the node is important,then the weight of the node should also be large.Fig.3 is a topology diagram of network nodes and their corresponding weights.

    Figure3:Network node graph

    5.2 Assessment system based on cloud model

    In our research,the cloud model was used as technical grade classification model.The cloud model was put foward by Li Deyi,he applied this model to the field of intelligent control for the first time [Wang,Peng and Zhang (2016)].The model is used to handle an unsure conversion in qualitative concepts and quantitative characterization.This model is used in many fields such as data mining,decision analysis,and intelligent control.

    Definition 1.Cloud and cloud drop.Suppose thatUdenote quantitative range of risk in accurate number representation,andCdenote the qualitative concept inU,That is,the evaluation of the degree of attack,normal,slightly,serious and destructive,In casex∈Udenotes a random implementation ofC,and degree of certainμ(x)∈[0,1] ofxforC:μ:U→[0,1],?x∈U,x→μ(x),and the distribution ofxin the domainUis definded as cloud,which was indicated by the cloudC(X).Everyxwas defined as cloud drop.Assuming that the domain of x is multi-dimensional,it can be extended to n-dimensional clouds accordingly.The calculation method of n-dimensional cloud is the same as that of one-dimensional.

    The overall characteristics of cloud model related concepts could be reflected in the numeral features of cloud,which used a three-dimensional feature such as Expected value (Ex),Entropy (En),and Hyper entropy (He) to denote a concept.The overall characteristics of the e multi-dimensional cloud model could be represented by multiple sets of digital features.

    Ex denotes an expectation value,which is based on the distribution of cloud droplets in the universe,this point that best denotes the qualitative concept,it is also the most prominent sample value for this value quantification;En is a unit of measure,which was used primarily to denotes the uncertainty of qualitative concepts.In addition,this concept changes with entropy,when this entropy becomes larger,and concept is also macroscopic.Which is determined by randomness and ambiguity of this concept,both are related.In addition,En could be seen as the measure of randomness,which reflect a level of probability of cloud drop that could denotes this value;from another perspective,it could be a measure of qualitative concepts,reflecting the range of values that could be accepted with concept space;Last concept is He,which indicates a uncertainty measure of En,that means,the entropy of entropy,this value is determined by two properties of entropy,they are randomness and ambiguity.These overall characteristics of the e qualitative concept denoted through the three digital features are indicated asC(Ex,En,He).This paper uses the reverse cloud generator to realize the transformation of the degree of risk to the influence level of a DDoS attack,the formula and algorithm are as follow:

    Algorithm 1 Assessment Input:risk degree value Output:Ex,En, He 1:setup cloud drop N 2:while get value x i do 3:get the sample mean of RD X =1 i =1 4:get 1n ∑ x i n n i =1 5:calculate sample variance s 2 =1∑ |x i -X |n i =1 6:calculate En according to Eq.(9)7:calculate He according to Eq.(10)8:end while 9:return Ex,En, He ∑ (x i -X )2 n n -1

    6 Experiment

    6.1 Experiment data set and evaluation standard

    The experiments below were based the dataset CAIDA DDoS attack 2007,the size of dataset is 21 GB.In this data set,normal network flow started at 13:49:36,and abnormal flow attacks occurred at 14:15:56.We introduce three related performance evaluation standards to evaluate the experimental results including Accurate Rate (AR),Detection Rate (DR),M issing Rate (MR).The calculation formula of evaluation standards define as follows:

    whereTNdenotes the number of attack samples correctly identified,the number of attack samples misidentified is denoted byFN,the number of normal samples correctly identified is denoted byTP,the number of normal samples misidentified is denoted byFP.With the formula above had definded,the related experiment could be started.

    6.2 Experiment results and analysis

    6.2.1 The experiment of detectionWe used different Δt of 100 ms,400 ms,800 ms,1000 ms,1600 ms and 2000 ms as the parametersoftraining model,and the comparison of BMLD value of network flow with different Δt as shown in Fig.4.

    Figure4:BMLD value of network flow with different Δt

    It can be seen from the comparison figures that the BMLD value could successfully distinguished normal flow and DDoS attack flow under six different Δt.The DDoS attack started at around the 79th second,it was worth noting that the BMLD value have dropped dramatically around 220th second.

    The reason is factor M,because the defined factor M is the amount of change between the the current new IP value and new IP average value,M value is unstable,which could change at a time rapidly.When calculating the BMLD value,the high sensitivity of M value will cause the BMLD value to drop.

    In the V-SVMexperiment,we randomly selected 5 training samples from the training set containing normal flow and attack flow,the size was 2000,4000,6000,8000 and 10000 records in sequence.As shown in Tab.1,we chose the kernel function RBF and V=0.2,in different sample size,support vector is different,but their accurate rate are up to 99%.As the number of samples increase,detection rate also increases and missing rate decreases.As we could see in table is that when the sample size is 10000,the detection rate is the highest which is 99.05% and its missing rate is lowest which is 1.5%.When the sample size is 2000,the support vector is 403 and its accurate rate is 99.9%,but its detection is the lowest when compared to other sample sizes.When the sample size is 6000,its accurate rate is 99.7% which is 0.2% accuracy less than 2000 sample size.

    Table1:V-SVM classification result based on RBF kernel function

    With the V-SVMexperiment has been done,we also did C-SVMexperiment.The purpose of these experiment is comparing the detection effects between two different types of support vector machines.The results of the ese experiments were shown in Fig.5.To ensure the reliability of the comparison,training set samples is unchanged,and five different test set samples are randomly chosen from test set which contains normal and attack samples.We compared the different parameters,such AR,DR and MR between C-SVMand VSVMin different number of samples.

    Figure5:Detection rate of two different methods

    From Fig.5 we can see that V-SVM can detect DDoS attacks better.When the number of sample is 2000,the detection rate of C-SVM is lowest,only 91.7%.When the number of samples is 4000,the detection rate is the same as 97.4%.However,when the number of sample is 8000,the detection rate of C-SVM is 93.5%,and the gap between V-SVMand C-SVM is bigger.When samples increase to 10000,the detection rate of C-SVMand VSVM remains high,and the gap between them is smaller,only 0.44%.According to the above results of comparison,when sample size increase,the detection rate of V-SVM is increasing then remains stable,indicating that the V-SVM method could accurately identify DDoS attacks.The detection rate of C-SVM is unstable,it also can identify DDoS attacks but its performance is not better than V-SVM.

    6.2.2 The experiment of assessment based on cloud model

    According to the weight assignment method in Section 4.2,the weight of the indexs are 0.254,0.349,0.397 respectively.According to formula (8)RD=NIR×SAD×ANF,we calculate the fusion value RD and classify it according to the cloud model.Before importing the RD value into cloud model,we need to normalize data.The normalization of data is to scale the data so as to compare data in an equal dimension.This method changes the dimensions and magnitude of different data,and convert it to a uniform dimension,which makes it easy to compare indexes with different units or magnitudes.The method we used in this paper is Min-max normalization method,that is,the data is uniformly mapped to the interval [0,1].After normalization of data,we divide the RD value into four levels,which are normal,low risk,medium risk and high risk respectively,and some test data are shown in Tab.2.

    Table2:Test data of the cloud model

    The corresponding network nodes are affected by the degree of normal,slightly affected,serious damaged and devastated respectively.In this paper,the qualitative transformation experiment based on inverse cloud generator is executed by using the calculated RD data.The cloud drop image generated according to the parameters of the e RD cloud model is shown in Fig.6.

    We can see in Fig.6 is that the distribution of RD corresponding to different risks is different,when network node is high risk,the value of RD are more concentrated in the subsequent interval,mostly between 0.75 and 1.0,this phase is the most violent phase of the DDoS attack,and the victim system is devastating.When network node is normal,RD is smaller than other risk degree and its maximum is 0.146580573.The four different risk degree of the system in the figure are represented by different colors,green means the system is normal,blue means the system suffers slightly,brown means the system suffers serious damage,and red means the system is devastating.From the figure,we can clearly see the risk status of the e network node,and can know the extent to which the network node is affected by the DDoS attack.Experiments show that cloud models can effectively evaluate DDoS attacks which can provide network administrators with certain

    attack situation information.

    Figure6:Different risk degree cloud model reduction map

    Compared with the assessment model based on Analytic Hierarchy Process (AHP) [Mano,Guillen-Gosalbez,Jimenez et al.(2019)],the evaluation model based in cloud model we have proposed which is taking uncertainty as the starting point,the subjective and objective information is better merged together,and the ambiguity and randomness are inherited,which constitutes the mapping between qualitative and quantitative,and effectively process the uncertainty of DDoS attack situation.On the other hand,the evaluation results finally obtained by this model are presented in the form of cloud images,which are highly intuitive.The comparison of cloud model and assessment model based on AHP is shown in Tab.3.

    Table3:Comparison of assessment model based on AHP

    7 Conclusion

    In this paper,we analyzed the characteristics of network flows during normal network flows and DDoS attacks.Then according to the state change characteristics of the e new and old user network flow’s IP address,we defined the fusion feature BMLD,and we used the V-SVM to identify DDoS attacks,V-SVM can better identify attacks with high accuracy and detection rate.The three proposed indicators better assess the impact of attack flow on network nodes.The cloud model used in this paper can effectively classify attack flow,four levels can better reflect the impact of network nodes on DDoS attacks.The experimental results show that the method can reasonably evaluate the security situation of DDoS attacks,which is more accurate and flexible than the existing evaluation methods.

    Funding:This work was supported by the Hainan Provincial Natural Science Foundation of China [2018CXTD333,617048];National Natural Science Foundation of China[61762033,61702539];Hainan University Doctor Start Fund Project [kyqd1328];Hainan University Youth Fund Project [qnjj1444];Hainan philosophy and social science 2016 planning project achievements [HNSK(YB)16-86].

    成人无遮挡网站| 观看美女的网站| av免费在线看不卡| 精品久久久久久久末码| 女的被弄到高潮叫床怎么办| 精品人妻一区二区三区麻豆| 国产精品麻豆人妻色哟哟久久 | 丰满乱子伦码专区| 欧美一区二区亚洲| 中文乱码字字幕精品一区二区三区 | av专区在线播放| 大陆偷拍与自拍| 男女下面进入的视频免费午夜| xxx大片免费视频| 国产精品人妻久久久影院| 国产精品精品国产色婷婷| 亚洲精品国产成人久久av| 国产亚洲av嫩草精品影院| 国产乱人偷精品视频| 99久久九九国产精品国产免费| freevideosex欧美| 最新中文字幕久久久久| 欧美激情在线99| 日韩一区二区三区影片| 亚洲,欧美,日韩| 久久热精品热| 97在线视频观看| 久久久久网色| 80岁老熟妇乱子伦牲交| 久久久午夜欧美精品| 亚洲18禁久久av| 精品久久久精品久久久| 国产精品麻豆人妻色哟哟久久 | 少妇熟女欧美另类| 99久久精品一区二区三区| 精品国产露脸久久av麻豆 | 亚洲精品中文字幕在线视频 | 久久久国产一区二区| 日本一二三区视频观看| 国产色爽女视频免费观看| 免费无遮挡裸体视频| 婷婷色综合大香蕉| 欧美性感艳星| 色视频www国产| 亚洲一区高清亚洲精品| 99久久精品一区二区三区| 美女脱内裤让男人舔精品视频| 99久久精品热视频| 国产免费视频播放在线视频 | 爱豆传媒免费全集在线观看| 99久国产av精品国产电影| 国产在视频线在精品| 久久久久国产网址| 久久久a久久爽久久v久久| 国产午夜精品论理片| 国产亚洲5aaaaa淫片| 国产亚洲最大av| 午夜激情福利司机影院| 91狼人影院| 纵有疾风起免费观看全集完整版 | 亚洲精品一区蜜桃| 成年女人看的毛片在线观看| 色吧在线观看| 亚洲四区av| 精品亚洲乱码少妇综合久久| 精品熟女少妇av免费看| 亚洲国产欧美人成| 啦啦啦啦在线视频资源| 精品少妇黑人巨大在线播放| 亚洲国产av新网站| 久久午夜福利片| 免费黄网站久久成人精品| 亚洲欧美日韩东京热| 亚洲成人中文字幕在线播放| 欧美成人a在线观看| 亚洲av电影不卡..在线观看| 美女脱内裤让男人舔精品视频| 色吧在线观看| 成人av在线播放网站| av专区在线播放| 午夜福利网站1000一区二区三区| 精品久久久久久久久av| 欧美性猛交╳xxx乱大交人| 日韩伦理黄色片| 国产一区有黄有色的免费视频 | 亚洲欧美清纯卡通| 国产精品女同一区二区软件| 国产免费视频播放在线视频 | 男女边摸边吃奶| 亚洲伊人久久精品综合| 青春草亚洲视频在线观看| 男插女下体视频免费在线播放| 亚洲精品456在线播放app| 成人综合一区亚洲| 国产伦一二天堂av在线观看| 成人毛片60女人毛片免费| 日韩精品有码人妻一区| 国产成人福利小说| 一个人观看的视频www高清免费观看| 成年人午夜在线观看视频 | 三级经典国产精品| 永久免费av网站大全| 国产永久视频网站| 自拍偷自拍亚洲精品老妇| 亚洲精品乱码久久久久久按摩| 久久久久久伊人网av| 精品久久国产蜜桃| 一二三四中文在线观看免费高清| 秋霞在线观看毛片| 国产精品麻豆人妻色哟哟久久 | 69人妻影院| 禁无遮挡网站| 欧美 日韩 精品 国产| 午夜视频国产福利| 国产精品久久久久久久电影| 婷婷色综合大香蕉| 国产成年人精品一区二区| 男女边吃奶边做爰视频| 噜噜噜噜噜久久久久久91| 国产视频首页在线观看| 一本久久精品| 国产精品蜜桃在线观看| 国产在线男女| 欧美最新免费一区二区三区| 国产亚洲5aaaaa淫片| 精品久久久久久久久av| 毛片一级片免费看久久久久| 建设人人有责人人尽责人人享有的 | 美女xxoo啪啪120秒动态图| 97超视频在线观看视频| 国产亚洲91精品色在线| 日本av手机在线免费观看| 久久草成人影院| 欧美最新免费一区二区三区| 国国产精品蜜臀av免费| 国产一级毛片在线| 国内精品美女久久久久久| 床上黄色一级片| 在线免费观看不下载黄p国产| 大又大粗又爽又黄少妇毛片口| 中文字幕久久专区| 国产又色又爽无遮挡免| 99re6热这里在线精品视频| 精品酒店卫生间| 亚洲自拍偷在线| 青春草亚洲视频在线观看| 能在线免费观看的黄片| 蜜桃久久精品国产亚洲av| 欧美最新免费一区二区三区| 一区二区三区高清视频在线| 久久99热这里只有精品18| 国产伦精品一区二区三区四那| 国产高清不卡午夜福利| 日韩中字成人| 综合色av麻豆| 一区二区三区乱码不卡18| 国产v大片淫在线免费观看| 国产成人a区在线观看| 日日啪夜夜爽| 日韩欧美一区视频在线观看 | 日韩中字成人| 嫩草影院精品99| 久99久视频精品免费| 国产激情偷乱视频一区二区| 免费观看在线日韩| 亚洲欧美成人综合另类久久久| 日韩成人av中文字幕在线观看| 99热6这里只有精品| 青春草视频在线免费观看| av.在线天堂| 久久久久精品久久久久真实原创| 欧美成人a在线观看| 欧美 日韩 精品 国产| 欧美激情久久久久久爽电影| 久久久成人免费电影| 午夜福利在线观看吧| 又爽又黄a免费视频| 十八禁网站网址无遮挡 | 在线a可以看的网站| 亚洲国产av新网站| 卡戴珊不雅视频在线播放| 久热久热在线精品观看| 久久久久免费精品人妻一区二区| 亚洲精品久久久久久婷婷小说| 亚洲av电影在线观看一区二区三区 | 蜜臀久久99精品久久宅男| 久久久精品欧美日韩精品| 欧美激情在线99| 麻豆成人午夜福利视频| 国产精品麻豆人妻色哟哟久久 | 日韩亚洲欧美综合| 观看免费一级毛片| 亚洲av日韩在线播放| 欧美精品国产亚洲| 好男人在线观看高清免费视频| 国产成人精品一,二区| 国产精品久久久久久久电影| 国内精品一区二区在线观看| 欧美变态另类bdsm刘玥| 午夜福利在线观看免费完整高清在| 精品一区二区三卡| 欧美不卡视频在线免费观看| 汤姆久久久久久久影院中文字幕 | 简卡轻食公司| 国产精品麻豆人妻色哟哟久久 | 五月天丁香电影| 日韩视频在线欧美| 日韩欧美 国产精品| 麻豆国产97在线/欧美| 日韩亚洲欧美综合| 国产成人精品一,二区| 国产女主播在线喷水免费视频网站 | 水蜜桃什么品种好| 亚洲性久久影院| 2021天堂中文幕一二区在线观| 久久久久久久午夜电影| 久久久久网色| 大又大粗又爽又黄少妇毛片口| 免费av观看视频| 成年女人看的毛片在线观看| 精品一区二区免费观看| 在线观看免费高清a一片| 狠狠精品人妻久久久久久综合| 黄色配什么色好看| 美女主播在线视频| 日日摸夜夜添夜夜爱| 久久精品国产亚洲av天美| 国产精品一区二区三区四区免费观看| 精品久久久久久久久亚洲| 免费观看无遮挡的男女| 欧美高清性xxxxhd video| 少妇高潮的动态图| 亚洲精品成人久久久久久| 一级二级三级毛片免费看| 美女高潮的动态| 精品少妇黑人巨大在线播放| 久久这里只有精品中国| 国产亚洲av嫩草精品影院| 成人一区二区视频在线观看| 麻豆久久精品国产亚洲av| 久久这里只有精品中国| 中文精品一卡2卡3卡4更新| 亚洲婷婷狠狠爱综合网| 国产69精品久久久久777片| 可以在线观看毛片的网站| 亚洲精品乱码久久久久久按摩| 噜噜噜噜噜久久久久久91| 亚洲一区高清亚洲精品| 国产精品.久久久| 亚洲自偷自拍三级| 在线 av 中文字幕| 国产精品人妻久久久久久| 亚洲成人精品中文字幕电影| 日日干狠狠操夜夜爽| 伊人久久国产一区二区| 免费观看在线日韩| 亚洲18禁久久av| 国产黄色视频一区二区在线观看| 熟妇人妻久久中文字幕3abv| 日韩精品有码人妻一区| 一个人观看的视频www高清免费观看| 黄色配什么色好看| 久久久亚洲精品成人影院| 国产精品爽爽va在线观看网站| 久久久色成人| 亚洲av电影不卡..在线观看| 国产伦在线观看视频一区| 国产不卡一卡二| 丰满少妇做爰视频| 99热这里只有是精品50| 22中文网久久字幕| 激情五月婷婷亚洲| 成人二区视频| 不卡视频在线观看欧美| 五月伊人婷婷丁香| 一区二区三区免费毛片| 观看免费一级毛片| 日韩人妻高清精品专区| 国产亚洲午夜精品一区二区久久 | 麻豆精品久久久久久蜜桃| 特级一级黄色大片| 婷婷六月久久综合丁香| 久久久久网色| 国产精品99久久久久久久久| 国产精品av视频在线免费观看| 国产精品一区www在线观看| 特级一级黄色大片| 99热网站在线观看| 国产精品久久久久久av不卡| 免费看日本二区| 内射极品少妇av片p| 国产亚洲5aaaaa淫片| 一个人观看的视频www高清免费观看| 日韩欧美国产在线观看| 成人毛片a级毛片在线播放| 91久久精品国产一区二区三区| 丰满少妇做爰视频| 91精品国产九色| 三级经典国产精品| 久久人人爽人人爽人人片va| 人妻少妇偷人精品九色| 天堂av国产一区二区熟女人妻| 天堂中文最新版在线下载 | www.av在线官网国产| 亚洲自拍偷在线| 最后的刺客免费高清国语| 亚洲在线观看片| 人体艺术视频欧美日本| 亚洲av成人精品一二三区| 亚洲国产最新在线播放| 国产成人精品一,二区| 久久99精品国语久久久| 亚洲国产精品成人综合色| 99热这里只有是精品50| 亚洲精品久久久久久婷婷小说| 男女视频在线观看网站免费| 久久久精品免费免费高清| 五月玫瑰六月丁香| 日韩欧美国产在线观看| freevideosex欧美| 久久精品久久精品一区二区三区| 麻豆av噜噜一区二区三区| 日韩在线高清观看一区二区三区| 97人妻精品一区二区三区麻豆| 男女视频在线观看网站免费| 国产综合懂色| 一区二区三区高清视频在线| 亚洲aⅴ乱码一区二区在线播放| 免费黄频网站在线观看国产| 亚洲av男天堂| 国产色爽女视频免费观看| 97人妻精品一区二区三区麻豆| 六月丁香七月| 秋霞伦理黄片| 免费高清在线观看视频在线观看| 日韩欧美精品免费久久| 91精品国产九色| 波野结衣二区三区在线| 国产亚洲91精品色在线| 少妇熟女欧美另类| 一个人看的www免费观看视频| 欧美精品国产亚洲| 秋霞在线观看毛片| 亚洲真实伦在线观看| 51国产日韩欧美| 国产一级毛片七仙女欲春2| 超碰av人人做人人爽久久| 蜜桃久久精品国产亚洲av| 夜夜看夜夜爽夜夜摸| 午夜激情久久久久久久| 日韩一区二区三区影片| 成人亚洲精品一区在线观看 | 日本三级黄在线观看| 亚洲精品自拍成人| 一个人观看的视频www高清免费观看| 真实男女啪啪啪动态图| 国产黄色免费在线视频| 天天躁日日操中文字幕| 精品一区二区三卡| 精品人妻视频免费看| 亚洲18禁久久av| 国产亚洲一区二区精品| 伦理电影大哥的女人| 久久精品综合一区二区三区| 99热这里只有是精品50| 亚洲成人中文字幕在线播放| 成年人午夜在线观看视频 | 男人舔女人下体高潮全视频| 狂野欧美白嫩少妇大欣赏| 欧美三级亚洲精品| 日韩亚洲欧美综合| 国产成人一区二区在线| 99久久精品热视频| 久久久久网色| 小蜜桃在线观看免费完整版高清| 中文天堂在线官网| 午夜福利视频精品| 国产成人午夜福利电影在线观看| 久久久久久伊人网av| 非洲黑人性xxxx精品又粗又长| 欧美区成人在线视频| 麻豆国产97在线/欧美| 午夜精品国产一区二区电影 | 国产伦精品一区二区三区视频9| 精品一区二区三区视频在线| 联通29元200g的流量卡| av福利片在线观看| 91久久精品国产一区二区三区| 欧美成人精品欧美一级黄| 免费观看在线日韩| 国产精品女同一区二区软件| 夜夜爽夜夜爽视频| 精品久久久久久久久亚洲| 水蜜桃什么品种好| 国产av码专区亚洲av| 少妇猛男粗大的猛烈进出视频 | 午夜免费男女啪啪视频观看| av国产免费在线观看| 国产精品熟女久久久久浪| 国产探花极品一区二区| 免费播放大片免费观看视频在线观看| 久久精品夜色国产| 插逼视频在线观看| 91在线精品国自产拍蜜月| 国产精品麻豆人妻色哟哟久久 | 天堂影院成人在线观看| 黑人高潮一二区| 国产淫语在线视频| 久久久精品94久久精品| 免费黄频网站在线观看国产| 日本色播在线视频| 女人十人毛片免费观看3o分钟| 如何舔出高潮| 1000部很黄的大片| 免费观看性生交大片5| 小蜜桃在线观看免费完整版高清| 99久久精品热视频| 啦啦啦啦在线视频资源| 身体一侧抽搐| videossex国产| 中文资源天堂在线| 免费大片18禁| 亚洲最大成人中文| av国产久精品久网站免费入址| 亚洲av二区三区四区| 欧美性猛交╳xxx乱大交人| 大又大粗又爽又黄少妇毛片口| 日产精品乱码卡一卡2卡三| 亚洲国产最新在线播放| 欧美日本视频| 爱豆传媒免费全集在线观看| 亚洲图色成人| 亚洲综合色惰| 黄色欧美视频在线观看| 国产精品日韩av在线免费观看| 国产精品人妻久久久久久| 舔av片在线| 一个人看视频在线观看www免费| 久久精品久久精品一区二区三区| 欧美区成人在线视频| 高清欧美精品videossex| 欧美精品一区二区大全| 麻豆成人午夜福利视频| 国产精品久久久久久久电影| 国产高清国产精品国产三级 | 亚洲国产精品专区欧美| 99久国产av精品| 亚洲精品,欧美精品| 久久久久久久国产电影| 精品久久久久久久久亚洲| 国产视频内射| 国产一区二区在线观看日韩| 精品久久国产蜜桃| 国产精品久久久久久久久免| 精品一区二区三区人妻视频| 国产亚洲最大av| 中文在线观看免费www的网站| 中文字幕av成人在线电影| 久久久久久久久中文| 亚洲国产精品sss在线观看| 午夜老司机福利剧场| 国产成人精品福利久久| 精品亚洲乱码少妇综合久久| 国产男人的电影天堂91| 99热这里只有精品一区| 免费高清在线观看视频在线观看| 好男人在线观看高清免费视频| 人体艺术视频欧美日本| 免费观看无遮挡的男女| 国产精品99久久久久久久久| 欧美三级亚洲精品| 久久久久精品性色| av免费观看日本| 在线观看人妻少妇| or卡值多少钱| 人人妻人人澡人人爽人人夜夜 | 久久久久免费精品人妻一区二区| 天堂av国产一区二区熟女人妻| 亚州av有码| 午夜精品国产一区二区电影 | 精品人妻一区二区三区麻豆| 国产av不卡久久| 国产伦一二天堂av在线观看| 能在线免费看毛片的网站| 国产爱豆传媒在线观看| 亚洲一区高清亚洲精品| 国产 亚洲一区二区三区 | 91狼人影院| 少妇裸体淫交视频免费看高清| 国产在线男女| 国产精品一及| 尾随美女入室| 国产伦精品一区二区三区视频9| 麻豆乱淫一区二区| 日韩av不卡免费在线播放| av免费观看日本| 免费黄频网站在线观看国产| 国产精品精品国产色婷婷| 丝袜美腿在线中文| 国产老妇女一区| 日本一二三区视频观看| 又爽又黄a免费视频| 夜夜看夜夜爽夜夜摸| 午夜福利在线观看吧| 久久综合国产亚洲精品| 免费看不卡的av| 听说在线观看完整版免费高清| 日韩,欧美,国产一区二区三区| 久久国内精品自在自线图片| 神马国产精品三级电影在线观看| 乱码一卡2卡4卡精品| 一级片'在线观看视频| 国产伦理片在线播放av一区| av在线天堂中文字幕| 国产伦在线观看视频一区| 欧美性猛交╳xxx乱大交人| 中国美白少妇内射xxxbb| 午夜激情久久久久久久| 观看免费一级毛片| 日韩大片免费观看网站| 午夜久久久久精精品| 七月丁香在线播放| 欧美变态另类bdsm刘玥| 18禁在线无遮挡免费观看视频| 日韩一本色道免费dvd| 久热久热在线精品观看| 久久久国产一区二区| 亚洲三级黄色毛片| 成人漫画全彩无遮挡| 18禁裸乳无遮挡免费网站照片| 亚洲国产高清在线一区二区三| 老司机影院成人| 久久久亚洲精品成人影院| 亚洲成人久久爱视频| av在线蜜桃| 春色校园在线视频观看| 欧美最新免费一区二区三区| 毛片一级片免费看久久久久| 欧美xxⅹ黑人| 国产精品蜜桃在线观看| 成年av动漫网址| 色哟哟·www| 免费看光身美女| 美女cb高潮喷水在线观看| 2022亚洲国产成人精品| 最近最新中文字幕大全电影3| 欧美一区二区亚洲| 高清午夜精品一区二区三区| 亚洲成人一二三区av| 国产男人的电影天堂91| 内射极品少妇av片p| 日韩成人av中文字幕在线观看| 大香蕉久久网| 免费看不卡的av| 有码 亚洲区| 青春草视频在线免费观看| 夫妻午夜视频| 日韩,欧美,国产一区二区三区| 亚洲国产精品成人久久小说| 亚洲欧美成人综合另类久久久| 久久久久久久久中文| 一区二区三区乱码不卡18| 国产午夜精品久久久久久一区二区三区| 亚洲国产精品国产精品| 欧美一区二区亚洲| 夜夜看夜夜爽夜夜摸| 久热久热在线精品观看| 国产精品三级大全| 国产精品一区二区三区四区免费观看| 亚洲欧美一区二区三区国产| 99热网站在线观看| 国产亚洲精品av在线| 欧美成人a在线观看| 99视频精品全部免费 在线| 性色avwww在线观看| 在线a可以看的网站| 日本午夜av视频| 国产一区二区三区综合在线观看 | 少妇裸体淫交视频免费看高清| 国产有黄有色有爽视频| 国产精品人妻久久久久久| 免费观看性生交大片5| 亚洲成色77777| 一个人看的www免费观看视频| 国产av国产精品国产| 国产精品一区二区三区四区免费观看| 午夜福利视频精品| 成人亚洲欧美一区二区av| 亚洲精品日本国产第一区| 亚洲精品成人久久久久久| 国产色婷婷99| 女人十人毛片免费观看3o分钟| 成人毛片a级毛片在线播放| 亚洲人成网站在线播| 久久精品综合一区二区三区| 国产免费视频播放在线视频 | 如何舔出高潮| 国产av不卡久久| 国产高清不卡午夜福利| 国产精品国产三级国产专区5o| 777米奇影视久久| 特级一级黄色大片| 国产精品久久视频播放| 成人毛片60女人毛片免费| 非洲黑人性xxxx精品又粗又长| 日韩欧美精品v在线| 亚洲国产成人一精品久久久| 99久久精品热视频| 欧美潮喷喷水| 青春草亚洲视频在线观看| 午夜福利在线观看免费完整高清在| 亚洲精品国产av蜜桃| 欧美性猛交╳xxx乱大交人| 亚洲精品aⅴ在线观看| 天堂影院成人在线观看|