首页> 外文期刊>Indian Journal of Science and Technology >Malicious Traffic Detection and Containment based on Connection Attempt Failures using Kernelized ELM with Automated Worm Containment Algorithm
【24h】

Malicious Traffic Detection and Containment based on Connection Attempt Failures using Kernelized ELM with Automated Worm Containment Algorithm

机译:使用自动蠕虫遏制算法的内核化ELM基于连接尝试失败的恶意流量检测和遏制

获取原文
           

摘要

Objectives: In the world of Internet today, most of the communications are done through Internet applications. Rapidly with the growth of Internet, the security threat on Internet is also increasing. Internet worms are one of the serious dangerous threats heavy financial losses. To overcome these damages, the proposed methodology provide better defense mechanism through Internet worm detection and containment schemes based on connection attempt failures characteristic. Method: The Internet worm detection is done using the Machine Learning Method based on Anomaly detection schemes and containment based on blocking schemes. The proposed kernelized Extreme Learning Machine with Automated Worm Containment Algorithm (kEA) method is used for detection and containment of malicious traffic from non-existing IP addresses based on connection attempt failures. Findings: Second channel based propagation through botnet worms propagates illegal traffic from malicious IP addresses through connection attempt failures. This traffic is transferred through TCP and UDP transmission schemes. The proposed work is used to identify the second channel propagating worms and containment of malicious traffic. Improvement: The proposed kernelized Extreme Learning Machine (kELM) method achieved detection accuracy improved by 23.67%. Then proposed kEA method blocks all the detected malicious IP addresses with 100% containment at the time span of 33 ms.
机译:目标:在当今的Internet世界中,大多数通信都是通过Internet应用程序完成的。随着Internet的迅速发展,Internet上的安全威胁也在增加。 Internet蠕虫是严重的财务威胁之一,严重的经济损失。为了克服这些损害,所提出的方法通过基于连接尝试失败特征的Internet蠕虫检测和遏制方案,提供了更好的防御机制。方法:使用基于异常检测方案的机器学习方法和基于阻止方案的包含来进行Internet蠕虫检测。提出的带有自动蠕虫遏制算法(kEA)方法的内核化极限学习机用于基于连接尝试失败来检测和遏制来自不存在IP地址的恶意流量。结果:通过僵尸网络蠕虫的第二个基于通道的传播通过连接尝试失败传播了来自恶意IP地址的非法流量。此流量通过TCP和UDP传输方案进行传输。拟议的工作用于识别传播蠕虫和遏制恶意流量的第二个通道。改进:提出的带内核的极限学习机(kELM)方法实现了23.67%的检测精度提高。然后,提出的kEA方法在33 ms的时间跨度内将所有检测到的恶意IP地址以100%的包含率阻止。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号