检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:赵菊芳 ZHAO Jufang(Guangzhou College of Commerce,Guangdong guangzhou 513363,China)
机构地区:[1]广州商学院,广东广州511363
出 处:《长江信息通信》2024年第6期102-104,共3页Changjiang Information & Communications
摘 要:由于不同尺度上的通信软件数据不具有可比性,导致在对DDoS攻击进行检测时,可靠性偏低,为此,提出基于深度学习的通信软件DDoS攻击检测方法研究。将所有的通信软件数据转换为0到1之间的值后,通过计算出所有可能的灰度级组合在单位距离和特定方向上的出现频率构建了通信软件数据灰度共生矩阵,将通信软件数据灰度共生矩阵的均值和方差特征作为基准,利用SHA-256哈希函数将数据转换为二进制编码形式。将重构后的数据输入到包含交叉熵损失函数的CNN网络中,根据更新偏置与通信软件数据灰度共生矩阵特征参数之间的关系,确定DDoS攻击数据。在测试结果中,PPV始终稳定在0.88以上,TPR稳定在0.92以上,具有较高的可靠性。Because the communication software data on different scales is not comparable,the re-liability is low when detecting DDoS attacks.Therefore,the detection method of DDoS attacks of communication software based on decp learning is proposed.After converting all the commu-nication software data into valuces betwecn O and 1,the symbiosis matrix of the communication software data is constructed by calculating the frequency of occurrence per unit distance and spe-cific direction,using the mean and variance characteristics of the communication software data as the benchmark,and the data is converted into binary coding form using SHA-256 hash function.The reconstructed data was fed into the CNN network containing the cross-entropy loss func-tion,and the DDoS attack data was determined based on the relationship between the update bias and the characteristic parameters of the gray-scale symbiosis matrix of the communication soft-ware data.In the test results,PPV was always stable above O.88,and TPR was stable above 0.92,with high reliability.
关 键 词:深度学习 通信软件 DDOS攻击检测 交叉熵损失函数 CNN网络
分 类 号:TU277[建筑科学—建筑设计及理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.143.110.165