• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A DDoS Attack Situation Assessment Method via Optim ized Cloud Model Based on Influence Function

    2019-11-25 10:22:58XiangyanTangQidongZhengJierenChengVictorShengRuiCaoandMeizhuChen
    Computers Materials&Continua 2019年9期

    Xiangyan Tang,Qidong Zheng, ,Jieren Cheng,2,Victor S.Sheng,Rui Cao and Meizhu Chen

    Abstract:The existing network security situation assessment methods cannot effectively assess the Distributed denial- of -service (DDoS) attack situation.In order to solve these problems,we propose a DDoS attack situation assessment method via optimized cloud model based on influence function.Firstly,according to the state change characteristics of the e IP addresses which are accessed by new and old user respectively,this paper defines a fusion feature value.Then,based on this value,we establish a V-Support Vector Machines(V-SVM) classification model to analyze network flow for identifying DDoS attacks.Secondly,according to the change of new and old IP addresses,we propose three evaluation indexes.Furthermore,we propose index weight calculation algorithm to measure the importance of different indexes.According to the fusion index,which is optimized by the weighted algorithm,we define the Risk Degree (RD) and calculate the RD value of each network node.Then we obtain the situation information of the whole network according to the RD values,which are from each network nodes with different weights.Finally,the whole situation information is classified via cloud model to quantitatively assess the DDoS attack situation.The experimental results show that our method can not only improve the detection rate and reduce the missing rate of DDoS attacks,but also access the DDoS attack situation effectively.This method is more accurate and flexible than the existing methods.

    Keywords:DDoS attack,V-SVM,influence function,cloud model.

    1 Introduction

    With the rapid rise of industries such as the Internet of Things,cloud computing,and big data,the global informationization process has been greatly promoted.These new technologies have brought innovation vitality to economic and social development,and at the same time,traditional network security protection faces serious threats and new challenges.Among the various types of security threats,the danger of DDoS attacks is especially serious.By controlling multiple puppet machines in different locations on the network to attack the victim simultaneously,the attacker uses asymmetry of resources to produce plenty of attack flow,causing abnormal service,thereby preventing legitimate users from accessing the network normally [Idhammad,Afdel and Belouch (2018)].According to the data provided by Tencent Cloud in 2018,the large-flow DDoS attacks in the first half of 2018 continued to increase [Teng,Liu,Liu et al.(2019)].Among them,Memcached DDoS has sprung up everywhere,with a reflection magnification of up to 50,000 and a peak of up to 1.7 Tbps of attack traffic,which has become a new focus of the e network security community.As one of the most important security threats the Internet faces,frequent DDoS attacks which leaded to major economic losses in the whole society.However,traditional single defense devices or detection devices are unable to meet security requirements.Different security factors can be integrated by the network security situation evaluation technology,dynamically reflect the network security status as a whole,and provide a reliable reference for enhancing network security.Therefore,the security situation assessment model and key technologies for the network have become the research hotspots at field of network security.

    The rest of the paper is organized as follows:the second part is the related work of network security situation assessment at home and abroad in recent years;the third part introduces the extraction of network flow attack features and the identification of attacks;the fourth part is the establishment of the assessment indexes and the optimization by the influence function;the fifth part is the assessment method via cloud model;the sixth part is the specific experiment and the analysis of experimental results.The seventh part is the conclusion of this article,and the last part is the reference.

    2 Related works

    Endsley proposed the concept of Situation Assessment (SA) firstly [Endsley (1988)].Then,Tim Bass applied the concept of SA at field of network security for the first time,and proposed the concept of network security situation assessment [Bass (2000)].

    In recent years,researchers from different countries have made some progress in this field and have obtained some research results.Zhao et al.[Zhao and Liu (2018)] used wavelet neural network algorithm which is based on particle swarm method,and obtained situational awareness context value in big data environment.The algorithm had fast convergence and good adaptability.Pu [Pu (2018)] used dynamic Bayesian networks to evaluate the attack effects of network nodes,whose method was more accurate and efficient than traditional node importance assessment methods.Xu et al.[Xu,Cao and Ren (2017)] proposed an IoT network security situation assessment model which is based on semantic ontology.The perception of this method was more comprehensive,and the ability was more powerful than the traditional network security situational awareness method.Liu et al.[Liu,Dong and Lv(2017)] proposed the confidence-based situation awareness method,which uses integrated learning algorithm and D-S evidence theory to calculate confidence of attack and combines various situational elements to obtain situation information.

    Lounis [Lounis (2018)] proposed a stochastic security evaluation method which used a tree model to establish related security scenarios,then used a stochastic model to evaluate security situation.Alali et al.[Alali,Almogren,Hassan et al.(2018)] used the fuzzy reasoning method to generate security assessment results that were based on four assessment indexes and conducted various analyses on these factors,the model could better assess system risk.Jana et al.[Jana and Ghosh (2018)] proposed a novel interval controller of fuzzy logic which improved the evaluation model about network risk,and improved the possibility of predicting network security risk assessment.Fan et al.[Fan,Xiao and Nayak(2017)] established a risk situation evaluation model through S of tware Defined Network(SDN),analyzed the features of the e common network attacks and Address Resolution Protocol (ARP) attack,and calculated the risk values of SDN via Hidden Markov Model(HMM).The network status can also be predicted by the proposed approach based on HMM.Dai et al.[Dai,Hu and Zheng (2017)] proposed a risk flow attack graph to construct a network assessment model to assess network risk whose method is capable of identifying network security situations effectively.Liu et al.[Liu,Zhang,Zhu et al.(2017)] put forward a hierarchical network menace situation evaluation method that was via D-S evidence method to assess the influence of DDoS attacks on the network,this method divided four layers,collection,extraction,fusion and assessment,DDoS attacks effect can be better reflected by the proposed method on the network security menace situation.

    Liu et al.[Liu,Wang and Lu (2016)] proposed a fusion-based control model of evaluation in network security situation,which provided new methods and means for monitoring and managing networks.Wu et al.[Wu,Liu and Xu (2016)] used the complex network theory to model the Security Situation Awareness (SSA) data,which could mine current data's features more effectively.Li et al.[Li and Zhao (2016)] proposed a method to obtain observations value through sliding time window,then through Multiple Population Genetic Algorithm (MPGA) for obtaining HMM parameters,thus improved the reliability of parameters.Zhang et al.[Zhang,Cheng,Tang et al.(2018)] proposed one algorithm to evaluate situation of DDoS,which improved Fuzzy C-means clustering algorithm.Sara et al.[Sara,Jose and Skarmeta (2018)] to solve problems of large-scale Internet of Things deployment,proposed a security certification method which was designed for IoT,this method could evaluate the security grade of a device automatically.Jordan et al.[Jordan and Niall (2018)] used Real-Time Dynamic Network Anomaly (ReTiNA) to combine anomalies on each edge of the network graph and then performed situational awareness across the whole network.Zhong et al.[Zhong,Lin,Liu et al.(2018)] proposed the data triage working retrieval system which can achieved cyber situational evaluation in Security Operations Center (SOC).This system can provide on-the-job advice for novice analysts.Yusuf et al.[Yusuf,Ge,Hong et al.(2018)] used a Temporal Hierarchical Attack Representation method to assess security index,when the status of systems changes,the indexes also changes.The results provide some insights about security indicators under network changes.

    Zahid-Hasan et al.[Zahid-Hasan,Zubair-Hasan and Sattar (2018)] used the Deep Convolution Neural Network for detecting DoS attack,this model is more effective than K-Nearest Neighbor (KNN).Cheng et al.[Cheng,Xu,Tang et al.(2018)] aim to deal with DDoS detection problems in big data environment,put an abnormal network flow characteristic prediction method forward,this method can identify DDoS attack better and solve the problem of compute resources consumption.Kshira et al.[Kshira,Deepak,Mayank et al.(2018)] applied information distance as a measurement in DDoS detecting which based on logically centralized controller,this method improved the detection accuracy.Khundrakpam et al.[Khundrakpam and Tanmay (2017)] applied for multi-layer perceptron and inherited algorithm in detecting DDoS attacks in application layer analysis.

    This method provided the minimum error compared to others traditional methods.Cheng et al.[Cheng,Zhou,Liu et al.(2018)] used the method of multi-protocol-fusion to define usual network flows and used Autoregressive Integrated Moving Average (ARIMA) to detect DDoS attack.Sabrina et al.[Sabrina,Alessandra,Daniele et al.(2018)] proposed a risk evaluation technology to assess dynamic and static components of an IoT system,this method was based on end-to-end systems.Alireza et al.[Alireza,Saygin,HungDa et al.(2018)] presented a method to use the game theory method to solve network security problems,this method could be applied for other area.Jin et al.[Jin,Simon,Dong et al.(2018)] put forward a different series of indexs to assess the Moving Target Defense technology,these indexs could of fer direction in choosing the best effective Moving Target Defense (MTD) technology.

    3 A DDoS attack detection based on V-SVM

    3.1 Features extracting

    Given a normal network flowUwithnsamples and a network flowVwithmsamples which need to be detected,this paper define each sample as (Ti,Si,Di),whereTirepresents the arrival time of packeti,Sidenote its source IP andDirepresents the destination IP.This paper uses the normal network flowUto train a model which identifies the network flowV,in the process of training and detection,the parameterΔtis the same.After the above definition,during the training process,at the end of thek-thΔt,we will take out the IP packet of the network flow sample corresponding to the whole period from the normal network flowU,and define it asGk.And for each IP packet inGk,if the IP address contained in the IP packet is invalid,the IP packet will be thrown away fromGk.We will define the sample group after filtering asFk.As getting eachFk,we gradually establish a set of IP addresses O,which represents the old users of the e current network.In the firstΔttime period,we merge all source IP addresses S inF1into the IP addresses O,and the maximum number of old users isOmax=Subsequently,the number of old users ofFkcalculated for thek-th (k>1)time isFk∩O,then we update the maximum number of old usersFinally,after calculating theOmax,we put each source IP address inFkinto IP addresses set O.By repeating this operation,we can get a maximum value that represents the old user in a specific time period.While updating ofOmax,we also need to calculate the number of new users in this time periodNk=||Fk||-||Fk∩O||.Since we already know that the setFk∩Orepresents old user,and the setFk?Odenotes new user at this time interval,Nkdenotes the number of new users.In the same way,we can also calculate the average number ofNin perΔtperiod asAfter above calculation,we have got four model parameters,the network flow detection operation could be started.We readVwithΔtas above,in every sample interval,we define the dictionaryWk[Sk,i] denotes the number of visitor of source IPSk,iduring each k-th time period.When everyΔtbe finished,we could get four parameters in k-th time period.And then they are defined as below.

    In Eq.(1),Bkdenotes a ratio of old IPs that appeared at present time interval k over the maximum number of old IPs in certain k intervals.Mkrepresents the changes in the number of new users in the current time interval k relative with number of average new IPs.Lkdenotes a percentage of the new user to the old user in current time interval k.DKdenotes accessing ratio of new user,more specifically,the feature value refers to the number of visitors of per new user in per second during the k time period.

    From actual experience,our old users will be accessed in a relatively fixed mode when the network is normal.This access mode can be used as a priori condition for DDoS attack identification.Assume thatOmax= 400 during training process,then if |Gk∩O| =200 old users in the detection flow,and the result of the calculation isIt could represent the maximum value ofOmaxcompared to the old users,the percentage of current old users is increased or decreased.

    Based on the definitions of DDoS,it is assumed that there should be many new users in the network flow under the DDoS attack.So||Gk?O||is assumed more bigger than the number of new IPs under general conditions,the feature valueMis a change amount indicating the average value of new IPs learned in the current time period relative to the new user learned in the training set.

    Supposing that attack is taking place,there is a reason to speculate current number of new IPs||Gk?O||is bigger than current number of old IPs.But there may be only a few old IPs and little new IPs appear.At this condition,supposing new IPs more than old IPs,thewill cause fluctuation.Therefore,the ratio of new IPs currently found in maximum number of the old IPs in the training is used asL.Based onMandL,if a DDoS attack occurs,the accessing ratio of the new IPs will be a great value because the network will receive many flooded packets from the attacker.In the normal flow or network congestion,because each normal user will abide by the TCP/IP protocol,the access rateDwill be a relatively small constant value.

    Due to the way the eigenvalues are calculated,it is important to avoid any eigenvalues be 0.Therefore,the calculation methods ofBkandLkare improved.

    WithinBk,Mk,LkandDkhave defined above,the product of them is calculated by us firstly,we then take the product's negative value which is defined asBMLDk.

    3.2 Attack recognition based on V-SVM

    The support vector machine approach is based on statistical learning's VC dimension theory and the rule of morphological risk minimization.According to message of finite samples,it looks for the most excellent compromise between the model’s complexity and the learning capability to acquire the best promotion capability.Compared with other machine learning algorithms such as neural network,decision tree and Adaboost,SVM classifier has simpler structure design,moderate computational complexity and better generalization performance.It shows a lot of great pluses in dealing with small sample,high and nonlinear dimensional pattern recognition.Mu et al.[Mu and Nandi (2005)]proposed a V-SVM that added a parameter V that could manage support vectors and error vectors in numbers.So as to show value of the parameter V and enhance the detection ratio of DDoS attacks and decrease false negative ratio,this paper used V-SVM method to detect DDoS attack.

    Most of the classification problems existing in real life are nonlinear.The support vector machine method is to choose a kernel function for nonlinear expansion.According to the actual problem and the research object,choosing the appropriate kernel function of ten plays a decisive role in the classification effect of the model.Under the conditions of Linear,Polynomial,Radial Basis Function,and Sigmoid four different types of kernel functions,the first two dimensions of the e partial training set are selected for visualization.The red and green marks represent the normal sample points and the abnormal sample points respectively,and the black marks indicate the support vectors.As shown in Fig.1,the impact of the kernel function on the decision hyperplane position is visually reflected.Compared to other kernel functions,this paper chose RBF kernel function,because the RBF kernel function has the highest classification accuracy and the lowest false negative rate.

    Although the parameter V controls the number of support vectors and error vectors very well,however,due to the difference in the specific objectsoftraining and the different degrees of influence of each feature on the classification results,the expected detection results may not be achieved.At present,there is no uniform set of best methods for the selection of V values at home and abroad.Based on the specific data,this paper analyzed the impact of artificial experience value V on DDoS attack detection,thus selected the appropriate V value.

    Figure1:Schematic diagram of V-SVM classification under different types of kernel functions

    The detection method is as shown in Fig.2 below.Firstly,the data set is analyzed,the appropriate features are selected,and the training set is normalized and reduced.The second step is to construct various SVM classification models,and study the process of classification model parameters and kernel function parameters optimization.The third step is to initialize the training model,import the training set to start the training of the model,the original issue is changed into a convex optimization issue,then the lagrangian function is constructed,the original problem is dualized and the kernel function is selected,the optimal solution α is solved by solving the dual problem through the Sequential Mini Optimization (SMO) algorithm,and then the optimal solutions w and b of the problem are solved.Finally,we obtain hyperplane and classification decision function.

    The last step,the constructed classification model is tested by a data set containing unknown tags,we analyzed the experimental results.The SMO algorithm is different from the SVMalgorithm,which is a heuristic type algorithm.When the solution of each variable in the algorithm reaches the Karush-Kuhn-Tucker (KKT) requirement for the optimization problem,the solution can be found.

    Figure2:DDoS attack detection process

    4 Assessment index optim ized by influence function

    4.1 Assessment index

    Based on the above detection results,this paper began to evaluate the impact of the DDoS attack.Because DDoS attack situations are multiple factors,ambiguity and subjective judgement,this paper quantifies the original qualitative evaluation,and then proposed three indexs as follow.

    On the one hand,under normal conditions,the number of new IP that accesses the website is small,because the users who access the website are basically old users.When a DDoS attack occurs,there will be accompanied by the emergence of a large number of new IP,so the rate of the number of new IP at time of attack to the maximum number of new IP at the normal time is a very meaningful value.So this paper propose New IP Ratio (NIR),the formula is as follows:

    whereNIindicates the number of addresses for different new IP that change over time when a DDoS attack occurs,andNmaxindicates the maximum number of new IP under normal conditions.NIRindicates the relative strength of the attack,that is,the degree of change of the attack new IP relative to the normal new IP maximum value relative to the normal conditions.For example,when a large number of new IP appear,it cannot be said that this is an attack,or it may be a network congestion or a hot event.So using relative values can better describe the changes in the new IP when an attack occurs.

    In addition,when an attack occurs that will cause denial of service,that is,attacker convey lots of IP packets to the victim,but it does not accept the third handshake,so the network flow with no return can be defined as a One-Way-Flow (OWF).When an attack occurs,the attack strength will increase with time going by,and the IP packets sent by the attacker will gradually increase.So we can define the absolute strength of the attack as follow:

    whereDFIindicates different packets in One-Way-Flow of new IP,SADindicates the service abnormality degree,that is,the number of packets of new IP increases with time,which can be used to measure the absolute strength of DDoS.

    Under normal conditions,the number of old IP is generally larger than the new IP.When a DDOS attack occurs,the number of new IP gradually increases,while the number of old IP gradually decreases.To express the dynamics between the new and old IP,we defined the following formula:

    whereNIindicates the number of addresses for different new IP that change over time when a DDoS attack occurs,ODindicates the dynamic change in the number of old users’IP addresses,ANFrepresents the ratio of addresses of different new IP to addresses of different old IP.

    4.2 Influence function

    The influence function is an important concept in robust statistics.It describes the degree of influence of a single outlier on the statistic,and reflects the variation of the statistic of the model distribution when it is polluted by the unit.The statistical approach provides a new perspective and provides a simple and flexible tool for robust statistics.For the first time,Koh et al.[Koh and Liang (2017)] applied influence function in machine learning.The learning algorithm tracks the prediction of the model and returns its training data,so that it can find the part of the training data that has the greatest impact on a given prediction.Because the weights ofNIR,SADandANFare different,we can use influence function to assign weights to them.

    The formula that influence function is defined as follows:

    5 Assessment method based on cloud model

    5.1 Risk Degree

    We define the Risk Degree (RD) which means the degree of risk of the system under ddos attack,the formula is as follows:

    This value is used to assess the risk level of each network node.Classify theRDof each network node fusion,which is classified into normal,low-risk,medium-risk and high-risk.Then,the four levels of each network node are merged,and then the level is divided into four levels,which indicate that the whole network node status is normal,slightly affected,serious damaged and devastated.

    Because the importance of each network node is different,this paper set the weight of each node to α1,α2,…,αn.For backbone nodes,the weight will be larger.If the asset of the node is important,then the weight of the node should also be large.Fig.3 is a topology diagram of network nodes and their corresponding weights.

    Figure3:Network node graph

    5.2 Assessment system based on cloud model

    In our research,the cloud model was used as technical grade classification model.The cloud model was put foward by Li Deyi,he applied this model to the field of intelligent control for the first time [Wang,Peng and Zhang (2016)].The model is used to handle an unsure conversion in qualitative concepts and quantitative characterization.This model is used in many fields such as data mining,decision analysis,and intelligent control.

    Definition 1.Cloud and cloud drop.Suppose thatUdenote quantitative range of risk in accurate number representation,andCdenote the qualitative concept inU,That is,the evaluation of the degree of attack,normal,slightly,serious and destructive,In casex∈Udenotes a random implementation ofC,and degree of certainμ(x)∈[0,1] ofxforC:μ:U→[0,1],?x∈U,x→μ(x),and the distribution ofxin the domainUis definded as cloud,which was indicated by the cloudC(X).Everyxwas defined as cloud drop.Assuming that the domain of x is multi-dimensional,it can be extended to n-dimensional clouds accordingly.The calculation method of n-dimensional cloud is the same as that of one-dimensional.

    The overall characteristics of cloud model related concepts could be reflected in the numeral features of cloud,which used a three-dimensional feature such as Expected value (Ex),Entropy (En),and Hyper entropy (He) to denote a concept.The overall characteristics of the e multi-dimensional cloud model could be represented by multiple sets of digital features.

    Ex denotes an expectation value,which is based on the distribution of cloud droplets in the universe,this point that best denotes the qualitative concept,it is also the most prominent sample value for this value quantification;En is a unit of measure,which was used primarily to denotes the uncertainty of qualitative concepts.In addition,this concept changes with entropy,when this entropy becomes larger,and concept is also macroscopic.Which is determined by randomness and ambiguity of this concept,both are related.In addition,En could be seen as the measure of randomness,which reflect a level of probability of cloud drop that could denotes this value;from another perspective,it could be a measure of qualitative concepts,reflecting the range of values that could be accepted with concept space;Last concept is He,which indicates a uncertainty measure of En,that means,the entropy of entropy,this value is determined by two properties of entropy,they are randomness and ambiguity.These overall characteristics of the e qualitative concept denoted through the three digital features are indicated asC(Ex,En,He).This paper uses the reverse cloud generator to realize the transformation of the degree of risk to the influence level of a DDoS attack,the formula and algorithm are as follow:

    Algorithm 1 Assessment Input:risk degree value Output:Ex,En, He 1:setup cloud drop N 2:while get value x i do 3:get the sample mean of RD X =1 i =1 4:get 1n ∑ x i n n i =1 5:calculate sample variance s 2 =1∑ |x i -X |n i =1 6:calculate En according to Eq.(9)7:calculate He according to Eq.(10)8:end while 9:return Ex,En, He ∑ (x i -X )2 n n -1

    6 Experiment

    6.1 Experiment data set and evaluation standard

    The experiments below were based the dataset CAIDA DDoS attack 2007,the size of dataset is 21 GB.In this data set,normal network flow started at 13:49:36,and abnormal flow attacks occurred at 14:15:56.We introduce three related performance evaluation standards to evaluate the experimental results including Accurate Rate (AR),Detection Rate (DR),M issing Rate (MR).The calculation formula of evaluation standards define as follows:

    whereTNdenotes the number of attack samples correctly identified,the number of attack samples misidentified is denoted byFN,the number of normal samples correctly identified is denoted byTP,the number of normal samples misidentified is denoted byFP.With the formula above had definded,the related experiment could be started.

    6.2 Experiment results and analysis

    6.2.1 The experiment of detectionWe used different Δt of 100 ms,400 ms,800 ms,1000 ms,1600 ms and 2000 ms as the parametersoftraining model,and the comparison of BMLD value of network flow with different Δt as shown in Fig.4.

    Figure4:BMLD value of network flow with different Δt

    It can be seen from the comparison figures that the BMLD value could successfully distinguished normal flow and DDoS attack flow under six different Δt.The DDoS attack started at around the 79th second,it was worth noting that the BMLD value have dropped dramatically around 220th second.

    The reason is factor M,because the defined factor M is the amount of change between the the current new IP value and new IP average value,M value is unstable,which could change at a time rapidly.When calculating the BMLD value,the high sensitivity of M value will cause the BMLD value to drop.

    In the V-SVMexperiment,we randomly selected 5 training samples from the training set containing normal flow and attack flow,the size was 2000,4000,6000,8000 and 10000 records in sequence.As shown in Tab.1,we chose the kernel function RBF and V=0.2,in different sample size,support vector is different,but their accurate rate are up to 99%.As the number of samples increase,detection rate also increases and missing rate decreases.As we could see in table is that when the sample size is 10000,the detection rate is the highest which is 99.05% and its missing rate is lowest which is 1.5%.When the sample size is 2000,the support vector is 403 and its accurate rate is 99.9%,but its detection is the lowest when compared to other sample sizes.When the sample size is 6000,its accurate rate is 99.7% which is 0.2% accuracy less than 2000 sample size.

    Table1:V-SVM classification result based on RBF kernel function

    With the V-SVMexperiment has been done,we also did C-SVMexperiment.The purpose of these experiment is comparing the detection effects between two different types of support vector machines.The results of the ese experiments were shown in Fig.5.To ensure the reliability of the comparison,training set samples is unchanged,and five different test set samples are randomly chosen from test set which contains normal and attack samples.We compared the different parameters,such AR,DR and MR between C-SVMand VSVMin different number of samples.

    Figure5:Detection rate of two different methods

    From Fig.5 we can see that V-SVM can detect DDoS attacks better.When the number of sample is 2000,the detection rate of C-SVM is lowest,only 91.7%.When the number of samples is 4000,the detection rate is the same as 97.4%.However,when the number of sample is 8000,the detection rate of C-SVM is 93.5%,and the gap between V-SVMand C-SVM is bigger.When samples increase to 10000,the detection rate of C-SVMand VSVM remains high,and the gap between them is smaller,only 0.44%.According to the above results of comparison,when sample size increase,the detection rate of V-SVM is increasing then remains stable,indicating that the V-SVM method could accurately identify DDoS attacks.The detection rate of C-SVM is unstable,it also can identify DDoS attacks but its performance is not better than V-SVM.

    6.2.2 The experiment of assessment based on cloud model

    According to the weight assignment method in Section 4.2,the weight of the indexs are 0.254,0.349,0.397 respectively.According to formula (8)RD=NIR×SAD×ANF,we calculate the fusion value RD and classify it according to the cloud model.Before importing the RD value into cloud model,we need to normalize data.The normalization of data is to scale the data so as to compare data in an equal dimension.This method changes the dimensions and magnitude of different data,and convert it to a uniform dimension,which makes it easy to compare indexes with different units or magnitudes.The method we used in this paper is Min-max normalization method,that is,the data is uniformly mapped to the interval [0,1].After normalization of data,we divide the RD value into four levels,which are normal,low risk,medium risk and high risk respectively,and some test data are shown in Tab.2.

    Table2:Test data of the cloud model

    The corresponding network nodes are affected by the degree of normal,slightly affected,serious damaged and devastated respectively.In this paper,the qualitative transformation experiment based on inverse cloud generator is executed by using the calculated RD data.The cloud drop image generated according to the parameters of the e RD cloud model is shown in Fig.6.

    We can see in Fig.6 is that the distribution of RD corresponding to different risks is different,when network node is high risk,the value of RD are more concentrated in the subsequent interval,mostly between 0.75 and 1.0,this phase is the most violent phase of the DDoS attack,and the victim system is devastating.When network node is normal,RD is smaller than other risk degree and its maximum is 0.146580573.The four different risk degree of the system in the figure are represented by different colors,green means the system is normal,blue means the system suffers slightly,brown means the system suffers serious damage,and red means the system is devastating.From the figure,we can clearly see the risk status of the e network node,and can know the extent to which the network node is affected by the DDoS attack.Experiments show that cloud models can effectively evaluate DDoS attacks which can provide network administrators with certain

    attack situation information.

    Figure6:Different risk degree cloud model reduction map

    Compared with the assessment model based on Analytic Hierarchy Process (AHP) [Mano,Guillen-Gosalbez,Jimenez et al.(2019)],the evaluation model based in cloud model we have proposed which is taking uncertainty as the starting point,the subjective and objective information is better merged together,and the ambiguity and randomness are inherited,which constitutes the mapping between qualitative and quantitative,and effectively process the uncertainty of DDoS attack situation.On the other hand,the evaluation results finally obtained by this model are presented in the form of cloud images,which are highly intuitive.The comparison of cloud model and assessment model based on AHP is shown in Tab.3.

    Table3:Comparison of assessment model based on AHP

    7 Conclusion

    In this paper,we analyzed the characteristics of network flows during normal network flows and DDoS attacks.Then according to the state change characteristics of the e new and old user network flow’s IP address,we defined the fusion feature BMLD,and we used the V-SVM to identify DDoS attacks,V-SVM can better identify attacks with high accuracy and detection rate.The three proposed indicators better assess the impact of attack flow on network nodes.The cloud model used in this paper can effectively classify attack flow,four levels can better reflect the impact of network nodes on DDoS attacks.The experimental results show that the method can reasonably evaluate the security situation of DDoS attacks,which is more accurate and flexible than the existing evaluation methods.

    Funding:This work was supported by the Hainan Provincial Natural Science Foundation of China [2018CXTD333,617048];National Natural Science Foundation of China[61762033,61702539];Hainan University Doctor Start Fund Project [kyqd1328];Hainan University Youth Fund Project [qnjj1444];Hainan philosophy and social science 2016 planning project achievements [HNSK(YB)16-86].

    免费观看a级毛片全部| 欧美性感艳星| 国产欧美日韩精品一区二区| 亚洲av男天堂| 中文字幕人妻熟人妻熟丝袜美| 最新中文字幕久久久久| 99热6这里只有精品| 男女边摸边吃奶| 秋霞在线观看毛片| 最新的欧美精品一区二区| 国产淫片久久久久久久久| 久久99一区二区三区| 久久久久精品性色| 日本-黄色视频高清免费观看| 日日爽夜夜爽网站| 国产白丝娇喘喷水9色精品| av卡一久久| 国产欧美亚洲国产| 一级毛片久久久久久久久女| 欧美人与善性xxx| 日韩av在线免费看完整版不卡| 中文乱码字字幕精品一区二区三区| 在线观看一区二区三区激情| 中文字幕人妻丝袜制服| 一级毛片我不卡| 亚洲成人av在线免费| 成人无遮挡网站| 精品人妻熟女毛片av久久网站| 最近中文字幕高清免费大全6| 欧美人与善性xxx| 人人妻人人添人人爽欧美一区卜| a级一级毛片免费在线观看| 免费av中文字幕在线| 少妇被粗大的猛进出69影院 | 亚洲av成人精品一二三区| 香蕉精品网在线| 汤姆久久久久久久影院中文字幕| 最近的中文字幕免费完整| av.在线天堂| 日韩 亚洲 欧美在线| 亚洲精品久久久久久婷婷小说| 人妻系列 视频| 久久国产乱子免费精品| 亚洲国产成人一精品久久久| 观看av在线不卡| 久久99热6这里只有精品| 日日啪夜夜撸| 啦啦啦啦在线视频资源| 欧美bdsm另类| 欧美成人午夜免费资源| 女人精品久久久久毛片| 久久狼人影院| 视频中文字幕在线观看| 大香蕉久久网| 国内精品宾馆在线| 欧美另类一区| 欧美老熟妇乱子伦牲交| 精品少妇久久久久久888优播| 国产男女超爽视频在线观看| 我要看黄色一级片免费的| 国产永久视频网站| 国产亚洲一区二区精品| 又大又黄又爽视频免费| 日本91视频免费播放| 色哟哟·www| 国产精品99久久久久久久久| 日韩一区二区三区影片| 少妇被粗大猛烈的视频| 国产日韩欧美亚洲二区| 亚洲国产成人一精品久久久| 秋霞在线观看毛片| videossex国产| 免费av中文字幕在线| 美女国产视频在线观看| 国产永久视频网站| 晚上一个人看的免费电影| 国产永久视频网站| 熟妇人妻不卡中文字幕| 九色成人免费人妻av| 五月开心婷婷网| 水蜜桃什么品种好| 成人国产麻豆网| 久久这里有精品视频免费| 久久97久久精品| 观看av在线不卡| 激情五月婷婷亚洲| 国产淫片久久久久久久久| 免费看日本二区| 亚洲人成网站在线观看播放| 精品国产一区二区三区久久久樱花| 午夜日本视频在线| 国产欧美另类精品又又久久亚洲欧美| 自拍欧美九色日韩亚洲蝌蚪91 | 国产欧美日韩精品一区二区| 亚洲中文av在线| 国产精品99久久久久久久久| 纵有疾风起免费观看全集完整版| 日本色播在线视频| 色吧在线观看| 在线观看免费高清a一片| 51国产日韩欧美| 免费看av在线观看网站| 亚洲图色成人| 亚洲国产日韩一区二区| 国产av精品麻豆| 亚洲精品乱码久久久久久按摩| 亚洲av成人精品一二三区| 亚洲情色 制服丝袜| 亚洲欧美中文字幕日韩二区| 日本91视频免费播放| 久久女婷五月综合色啪小说| 寂寞人妻少妇视频99o| 精品一区二区免费观看| 国产成人a∨麻豆精品| 中文字幕免费在线视频6| 国产一区二区三区综合在线观看 | 香蕉精品网在线| 精品人妻在线不人妻| 性色av乱码一区二区三区2| 性色av乱码一区二区三区2| 亚洲伊人久久精品综合| 黑人欧美特级aaaaaa片| 欧美精品亚洲一区二区| 欧美av亚洲av综合av国产av| 肉色欧美久久久久久久蜜桃| 亚洲国产av影院在线观看| 久久久久久久精品精品| 国产精品久久久久久精品电影小说| 国产又爽黄色视频| 成在线人永久免费视频| 99精品久久久久人妻精品| 脱女人内裤的视频| 精品国产超薄肉色丝袜足j| 他把我摸到了高潮在线观看 | 欧美人与性动交α欧美精品济南到| 伦理电影免费视频| 超碰成人久久| 新久久久久国产一级毛片| 亚洲精品美女久久久久99蜜臀| 人成视频在线观看免费观看| 99久久国产精品久久久| av一本久久久久| 两性午夜刺激爽爽歪歪视频在线观看 | 欧美精品一区二区免费开放| 日韩有码中文字幕| 欧美中文综合在线视频| 久久国产亚洲av麻豆专区| 亚洲精品一区蜜桃| 大香蕉久久成人网| 女警被强在线播放| 搡老熟女国产l中国老女人| 青春草视频在线免费观看| 亚洲一区二区三区欧美精品| 免费一级毛片在线播放高清视频 | 天天添夜夜摸| 多毛熟女@视频| 蜜桃国产av成人99| 国产免费福利视频在线观看| 啦啦啦在线免费观看视频4| 久久精品国产a三级三级三级| 久久人妻熟女aⅴ| 国产人伦9x9x在线观看| 国产在线一区二区三区精| 久久久久久久久久久久大奶| 国产成人a∨麻豆精品| 男人添女人高潮全过程视频| 99精品久久久久人妻精品| 搡老熟女国产l中国老女人| 久久精品aⅴ一区二区三区四区| 91国产中文字幕| 91精品伊人久久大香线蕉| 欧美av亚洲av综合av国产av| 99香蕉大伊视频| 一本久久精品| 国产精品二区激情视频| 大码成人一级视频| 日韩中文字幕欧美一区二区| 香蕉丝袜av| 久久午夜综合久久蜜桃| 在线观看人妻少妇| 欧美日韩视频精品一区| 在线 av 中文字幕| 99re6热这里在线精品视频| 久久久久久亚洲精品国产蜜桃av| 丝袜在线中文字幕| 99国产精品一区二区蜜桃av | 久久久国产一区二区| 男男h啪啪无遮挡| 激情视频va一区二区三区| 久久精品人人爽人人爽视色| 免费不卡黄色视频| 下体分泌物呈黄色| 亚洲人成77777在线视频| 国产精品免费大片| 老熟女久久久| 国产黄频视频在线观看| 欧美精品啪啪一区二区三区 | 精品一区在线观看国产| 午夜精品国产一区二区电影| 一级,二级,三级黄色视频| 国产免费视频播放在线视频| 国产免费av片在线观看野外av| bbb黄色大片| 免费日韩欧美在线观看| 五月开心婷婷网| 国产成人啪精品午夜网站| 午夜精品国产一区二区电影| 欧美亚洲 丝袜 人妻 在线| 丝袜美足系列| 欧美黄色片欧美黄色片| 自拍欧美九色日韩亚洲蝌蚪91| 老汉色∧v一级毛片| 51午夜福利影视在线观看| 国产日韩一区二区三区精品不卡| 国产日韩欧美在线精品| 精品一区二区三区四区五区乱码| 一级a爱视频在线免费观看| 亚洲av日韩精品久久久久久密| 亚洲国产中文字幕在线视频| 乱人伦中国视频| 久久天躁狠狠躁夜夜2o2o| 真人做人爱边吃奶动态| 日韩制服丝袜自拍偷拍| 久久国产精品男人的天堂亚洲| 久久av网站| a级毛片在线看网站| 欧美中文综合在线视频| 一级黄色大片毛片| 丝瓜视频免费看黄片| 中文字幕人妻丝袜一区二区| 午夜福利在线观看吧| 亚洲国产精品一区三区| 999精品在线视频| 亚洲久久久国产精品| 亚洲人成电影免费在线| av不卡在线播放| 午夜影院在线不卡| 亚洲欧美一区二区三区黑人| 日本撒尿小便嘘嘘汇集6| 精品国产国语对白av| 99国产极品粉嫩在线观看| 性色av乱码一区二区三区2| 老司机福利观看| 久久久久网色| 国产一区有黄有色的免费视频| 亚洲人成77777在线视频| cao死你这个sao货| 欧美一级毛片孕妇| 不卡av一区二区三区| 亚洲国产看品久久| 色精品久久人妻99蜜桃| 国产片内射在线| 黄网站色视频无遮挡免费观看| 宅男免费午夜| 国产色视频综合| 脱女人内裤的视频| 好男人电影高清在线观看| 久久国产精品大桥未久av| 十分钟在线观看高清视频www| 大片免费播放器 马上看| 欧美在线黄色| a在线观看视频网站| 久久人人爽av亚洲精品天堂| 老司机靠b影院| 在线精品无人区一区二区三| 黑人猛操日本美女一级片| 亚洲全国av大片| 视频在线观看一区二区三区| 777久久人妻少妇嫩草av网站| 午夜福利免费观看在线| 免费在线观看日本一区| 男女床上黄色一级片免费看| 男女国产视频网站| 美女中出高潮动态图| 人人妻人人澡人人看| 欧美成人午夜精品| 性色av乱码一区二区三区2| 免费一级毛片在线播放高清视频 | 母亲3免费完整高清在线观看| 男男h啪啪无遮挡| 美女高潮喷水抽搐中文字幕| 久久久久精品国产欧美久久久 | 一进一出抽搐动态| 亚洲国产欧美日韩在线播放| 黄片大片在线免费观看| 久久久久国产精品人妻一区二区| 国产成人精品无人区| 咕卡用的链子| 成人亚洲精品一区在线观看| 91精品国产国语对白视频| 亚洲国产精品999| 亚洲综合色网址| 涩涩av久久男人的天堂| 亚洲国产av影院在线观看| 蜜桃国产av成人99| 久久久精品区二区三区| 亚洲av国产av综合av卡| 97精品久久久久久久久久精品| 成年美女黄网站色视频大全免费| 一本大道久久a久久精品| 久久久国产精品麻豆| 人人妻人人添人人爽欧美一区卜| 亚洲,欧美精品.| 夫妻午夜视频| 久久狼人影院| 免费久久久久久久精品成人欧美视频| 精品一区二区三卡| 狂野欧美激情性xxxx| 亚洲伊人色综图| 最黄视频免费看| 国产亚洲一区二区精品| 国产黄频视频在线观看| 丰满饥渴人妻一区二区三| 永久免费av网站大全| 又黄又粗又硬又大视频| 久久女婷五月综合色啪小说| 在线观看免费高清a一片| 十八禁网站免费在线| 青春草亚洲视频在线观看| 欧美黑人精品巨大| 欧美少妇被猛烈插入视频| 日韩 欧美 亚洲 中文字幕| 成人国语在线视频| 国产亚洲精品第一综合不卡| 少妇人妻久久综合中文| av在线app专区| av福利片在线| 亚洲 国产 在线| 国产熟女午夜一区二区三区| 蜜桃国产av成人99| 美女主播在线视频| 亚洲专区中文字幕在线| 精品国产一区二区久久| 成年av动漫网址| 久久香蕉激情| 91字幕亚洲| 久久久国产成人免费| 亚洲三区欧美一区| 中文欧美无线码| 国产精品国产三级国产专区5o| 久久天躁狠狠躁夜夜2o2o| 欧美日韩av久久| 亚洲欧美一区二区三区黑人| 老司机深夜福利视频在线观看 | 精品少妇一区二区三区视频日本电影| 又大又爽又粗| 亚洲精品在线美女| 亚洲美女黄色视频免费看| 黄网站色视频无遮挡免费观看| 一级,二级,三级黄色视频| 黄色视频在线播放观看不卡| 人成视频在线观看免费观看| 亚洲专区国产一区二区| 欧美日韩成人在线一区二区| 日韩中文字幕欧美一区二区| 亚洲色图 男人天堂 中文字幕| 在线观看www视频免费| 欧美日韩成人在线一区二区| 蜜桃国产av成人99| 国产欧美日韩综合在线一区二区| 999精品在线视频| 成年人黄色毛片网站| 久久国产精品影院| 最新的欧美精品一区二区| 久久人人爽人人片av| 亚洲精品日韩在线中文字幕| 麻豆乱淫一区二区| 大香蕉久久成人网| 12—13女人毛片做爰片一| 欧美人与性动交α欧美精品济南到| 国产成人欧美| 亚洲人成电影免费在线| av线在线观看网站| 99久久精品国产亚洲精品| 亚洲av成人不卡在线观看播放网 | 久久精品熟女亚洲av麻豆精品| 国产亚洲欧美精品永久| 少妇被粗大的猛进出69影院| 9色porny在线观看| www.999成人在线观看| 美女扒开内裤让男人捅视频| 日韩制服丝袜自拍偷拍| 天天操日日干夜夜撸| 脱女人内裤的视频| 国产真人三级小视频在线观看| 99热国产这里只有精品6| 一级a爱视频在线免费观看| 女性生殖器流出的白浆| av天堂久久9| 97在线人人人人妻| 这个男人来自地球电影免费观看| 亚洲 欧美一区二区三区| 巨乳人妻的诱惑在线观看| 黄色片一级片一级黄色片| 不卡av一区二区三区| 国产欧美亚洲国产| 午夜久久久在线观看| 伊人久久大香线蕉亚洲五| 1024视频免费在线观看| 热re99久久国产66热| 亚洲成人国产一区在线观看| 最新在线观看一区二区三区| 成年人午夜在线观看视频| 中文字幕人妻丝袜一区二区| 操美女的视频在线观看| 亚洲五月色婷婷综合| 99精国产麻豆久久婷婷| 国产精品一区二区免费欧美 | 99香蕉大伊视频| 水蜜桃什么品种好| 国内毛片毛片毛片毛片毛片| 脱女人内裤的视频| 热99久久久久精品小说推荐| 精品久久蜜臀av无| 黑人巨大精品欧美一区二区蜜桃| 超色免费av| a 毛片基地| 91av网站免费观看| 少妇猛男粗大的猛烈进出视频| 久热这里只有精品99| 十分钟在线观看高清视频www| 婷婷成人精品国产| 亚洲av欧美aⅴ国产| 欧美日韩国产mv在线观看视频| 国产精品一区二区在线观看99| 精品国产国语对白av| 免费观看av网站的网址| 久热爱精品视频在线9| 国产精品偷伦视频观看了| 悠悠久久av| 精品国产一区二区久久| 国产真人三级小视频在线观看| 国产精品欧美亚洲77777| 欧美黄色片欧美黄色片| 黄色毛片三级朝国网站| 国产伦人伦偷精品视频| 欧美精品亚洲一区二区| 欧美日韩视频精品一区| 女人高潮潮喷娇喘18禁视频| 色综合欧美亚洲国产小说| 久久毛片免费看一区二区三区| 久久综合国产亚洲精品| 亚洲人成77777在线视频| 国产在视频线精品| 男女边摸边吃奶| 不卡一级毛片| 日本wwww免费看| 无遮挡黄片免费观看| 成人三级做爰电影| 美女高潮喷水抽搐中文字幕| 丝袜美足系列| 欧美在线一区亚洲| 999精品在线视频| 极品人妻少妇av视频| 国产xxxxx性猛交| 国产高清videossex| 欧美黑人欧美精品刺激| 免费观看av网站的网址| av免费在线观看网站| 两性夫妻黄色片| www.自偷自拍.com| 亚洲国产欧美在线一区| 91麻豆精品激情在线观看国产 | 黄色视频,在线免费观看| 女性被躁到高潮视频| 最新的欧美精品一区二区| 午夜视频精品福利| 亚洲第一欧美日韩一区二区三区 | 国产一区二区激情短视频 | 欧美人与性动交α欧美精品济南到| 国产成人欧美| 亚洲成国产人片在线观看| 国产精品久久久人人做人人爽| xxxhd国产人妻xxx| 最近中文字幕2019免费版| 国产亚洲精品一区二区www | 亚洲国产精品一区二区三区在线| 亚洲三区欧美一区| 老司机午夜十八禁免费视频| 欧美黑人精品巨大| 一区二区三区四区激情视频| 亚洲精品中文字幕一二三四区 | 免费在线观看影片大全网站| 在线观看免费日韩欧美大片| 免费久久久久久久精品成人欧美视频| 搡老熟女国产l中国老女人| 日韩视频一区二区在线观看| 国产亚洲精品一区二区www | av在线播放精品| 国产欧美亚洲国产| 国精品久久久久久国模美| 精品少妇黑人巨大在线播放| 黄片播放在线免费| 国产欧美日韩精品亚洲av| 午夜免费鲁丝| 19禁男女啪啪无遮挡网站| 日日爽夜夜爽网站| 国产精品九九99| 男男h啪啪无遮挡| 久久中文字幕一级| 一边摸一边抽搐一进一出视频| 深夜精品福利| 50天的宝宝边吃奶边哭怎么回事| 十八禁网站免费在线| 亚洲精品av麻豆狂野| 99精品欧美一区二区三区四区| 国产亚洲午夜精品一区二区久久| 精品国产一区二区三区四区第35| 最新在线观看一区二区三区| 日本91视频免费播放| 免费不卡黄色视频| videos熟女内射| 中文字幕色久视频| 天天影视国产精品| 一级片'在线观看视频| 国产一区有黄有色的免费视频| 少妇的丰满在线观看| 午夜免费成人在线视频| 菩萨蛮人人尽说江南好唐韦庄| 精品亚洲乱码少妇综合久久| e午夜精品久久久久久久| 人人妻,人人澡人人爽秒播| 亚洲av男天堂| 国产成人系列免费观看| 亚洲国产欧美在线一区| 久久狼人影院| 免费av中文字幕在线| 欧美老熟妇乱子伦牲交| 黄色a级毛片大全视频| 亚洲精品粉嫩美女一区| 日本av手机在线免费观看| 十八禁网站网址无遮挡| 黄色毛片三级朝国网站| 大陆偷拍与自拍| 超碰成人久久| 纵有疾风起免费观看全集完整版| 国产无遮挡羞羞视频在线观看| av片东京热男人的天堂| 午夜福利,免费看| 我要看黄色一级片免费的| 香蕉国产在线看| 久久久国产欧美日韩av| 人人妻人人添人人爽欧美一区卜| 在线看a的网站| 婷婷色av中文字幕| 亚洲综合色网址| 亚洲精品粉嫩美女一区| 欧美精品亚洲一区二区| 国产麻豆69| 18禁国产床啪视频网站| 丰满少妇做爰视频| 中文字幕另类日韩欧美亚洲嫩草| 五月天丁香电影| 久久精品亚洲av国产电影网| 亚洲成人免费av在线播放| 91老司机精品| 久久人妻福利社区极品人妻图片| 午夜两性在线视频| 老司机午夜福利在线观看视频 | 久久人妻熟女aⅴ| 美女视频免费永久观看网站| 777米奇影视久久| 蜜桃在线观看..| 91精品国产国语对白视频| 国产av精品麻豆| 999久久久精品免费观看国产| 精品欧美一区二区三区在线| 国产三级黄色录像| 中文字幕av电影在线播放| 中文字幕另类日韩欧美亚洲嫩草| 国产一级毛片在线| 法律面前人人平等表现在哪些方面 | 18禁裸乳无遮挡动漫免费视频| 精品乱码久久久久久99久播| 一本大道久久a久久精品| 国产熟女午夜一区二区三区| 午夜免费观看性视频| 午夜91福利影院| 欧美精品一区二区免费开放| 精品一区二区三卡| 国产成人精品久久二区二区免费| 亚洲人成电影观看| 日本欧美视频一区| 男男h啪啪无遮挡| 桃红色精品国产亚洲av| 国产亚洲av片在线观看秒播厂| 久久久久久久精品精品| 69av精品久久久久久 | 91成年电影在线观看| 亚洲三区欧美一区| 人妻久久中文字幕网| 91成年电影在线观看| 热99国产精品久久久久久7| 别揉我奶头~嗯~啊~动态视频 | 一级毛片电影观看| 亚洲久久久国产精品| 王馨瑶露胸无遮挡在线观看| 香蕉国产在线看| 久热这里只有精品99| 午夜福利影视在线免费观看| 别揉我奶头~嗯~啊~动态视频 | av国产精品久久久久影院| 欧美精品人与动牲交sv欧美| 12—13女人毛片做爰片一| 精品一区在线观看国产| 成年美女黄网站色视频大全免费| 狠狠精品人妻久久久久久综合| 91大片在线观看| 大型av网站在线播放| 欧美+亚洲+日韩+国产| 国产精品一区二区免费欧美 | 国产欧美日韩一区二区三区在线| 成人影院久久| 精品免费久久久久久久清纯 | 啦啦啦啦在线视频资源|