检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Yinglun Ma Xu Chen Wei Feng Ning Ge
机构地区:[1]Department of Electronic Engineering,Tsinghua University,Beijing 100084,China [2]Beijing National Research Center for Information Science and Technology,Beijing 100084,China
出 处:《China Communications》2022年第5期141-149,共9页中国通信(英文版)
基 金:This work was supported in part by the National Key R&D Program of China under Grant 2020YFA0711301;in part by the National Natural Science Foundation of China under Grant 61922049,and Grant 61941104;in part by the Tsinghua University-China Mobile Communications Group Company Ltd.,Joint Institute.
摘 要:With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows.
关 键 词:sixth generation(6G)network internet of things(IoT) trust model distributed denial of service(DDoS)
分 类 号:TN915.08[电子电信—通信与信息系统] TP391.44[电子电信—信息与通信工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222