首页> 美国卫生研究院文献>Sensors (Basel Switzerland) >A Spatiotemporal-Oriented Deep Ensemble Learning Model to Defend Link Flooding Attacks in IoT Network
【2h】

A Spatiotemporal-Oriented Deep Ensemble Learning Model to Defend Link Flooding Attacks in IoT Network

机译:一种时空的深度集成学习模型用于捍卫IOT网络中的链接洪水攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

(1) Background: Link flooding attacks (LFA) are a spatiotemporal attack pattern of distributed denial-of-service (DDoS) that arranges bots to send low-speed traffic to backbone links and paralyze servers in the target area. (2) Problem: The traditional methods to defend against LFA are heuristic and cannot reflect the changing characteristics of LFA over time; the AI-based methods only detect the presence of LFA without considering the spatiotemporal series attack pattern and defense suggestion. (3) Methods: This study designs a deep ensemble learning model (Stacking-based integrated Convolutional neural network–Long short term memory model, SCL) to defend against LFA: (a) combining continuous network status as an input to represent “continuous/combination attacking action” and to help CNN operation to extract features of spatiotemporal attack pattern; (b) applying LSTM to periodically review the current evolved LFA patterns and drop the obsolete ones to ensure decision accuracy and confidence; (c) stacking System Detector and LFA Mitigator module instead of only one module to couple with LFA detection and mediation at the same time. (4) Results: The simulation results show that the accuracy rate of SCL successfully blocking LFA is 92.95%, which is 60.81% higher than the traditional method. (5) Outcomes: This study demonstrates the potential and suggested development trait of deep ensemble learning on network security.
机译:(1)背景:链路泛洪攻击(LFA)是分布式拒绝服务(DDOS)的时空攻击模式,可安排机器人在目标区域中向骨干链路和瘫痪服务器发送低速流量。 (2)问题:对LFA防御的传统方法是启发式的,不能反映LFA的变化特征随着时间的推移;基于AI的方法只检测LFA的存在,而不考虑时空系列攻击模式和防御建议。 (3)方法:本研究设计了深度集成学习模型(基于堆叠的集成卷积神经网络长期内存模型,SCL),用于防御LFA:(a)将连续网络状态与输入相结合以表示“连续/结合攻击动作“并帮助CNN操作提取空间攻击模式的特征; (b)申请LSTM定期审查当前演进的LFA模式,并放下过时的LFA模式,以确保决策准确性和信心; (c)堆叠系统检测器和LFA缓解仪模块,而不是同时仅与LFA检测和调解耦合的一个模块。 (4)结果:仿真结果表明,SCL成功阻断LFA的精度率为92.95%,比传统方法高60.81%。 (5)结果:本研究展示了网络安全深度集体学习的潜在和建议的发展特征。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号