没有合适的资源?快使用搜索试试~ 我知道了~
分布式DDoS攻击恶意行为知识库设计与实现.docx
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
0 下载量 135 浏览量
2024-03-29
09:09:18
上传
评论
收藏 3.44MB DOCX 举报
温馨提示
![preview](https://dl-preview.csdnimg.cn/89048907/0001-32a6193763e215926f11fcd5ecf898ad_thumbnail-wide.jpeg)
![preview-icon](https://csdnimg.cn/release/downloadcmsfe/public/img/scale.ab9e0183.png)
试读
117页
分布式DDoS攻击恶意行为知识库设计与实现.docx分布式DDoS攻击恶意行为知识库设计与实现.docx分布式DDoS攻击恶意行为知识库设计与实现.docx分布式DDoS攻击恶意行为知识库设计与实现.docx分布式DDoS攻击恶意行为知识库设计与实现.docx分布式DDoS攻击恶意行为知识库设计与实现.docx分布式DDoS攻击恶意行为知识库设计与实现.docx分布式DDoS攻击恶意行为知识库设计与实现.docx
资源推荐
资源详情
资源评论
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![zip](https://img-home.csdnimg.cn/images/20210720083736.png)
![rar](https://img-home.csdnimg.cn/images/20210720083606.png)
![zip](https://img-home.csdnimg.cn/images/20210720083736.png)
![docx](https://img-home.csdnimg.cn/images/20210720083331.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![](https://csdnimg.cn/release/download_crawler_static/89048907/bg1.jpg)
分布式DDoS 攻击恶意行为知识库设计与实现
Design and Implementation of Distributed Malicious Behaviors
Knowledge Base for DDoS Attacks
作者:xxxx
导师: xx
202x 年 6 月
![](https://csdnimg.cn/release/download_crawler_static/89048907/bg2.jpg)
iii
致谢
时光荏苒岁月如梭,转眼间三年的研究生生活将告一段落,初到交大的场景
还历历在目,如今已经在交大待了整整七年,不久就将离开校园步入职场。在论
文即将完成之际,真诚地向所有关心、帮助过我的老师、同学、家人致以感谢。
感谢国家重点研发计划课题“基于身份的可信协议与恶意通信行为监控方法”
为本次研究提供的资助。
感谢教授的悉心指导,老师无论是对学术还是生活都秉持着严谨的态度,对
我的论文从格式到内容,从结构到逻辑都会仔细查看并提出十分准确的修改意见
,对工作和学习都让我养成事先准备的习惯,让我这三年的研究生生活和往后的
时间都受益匪浅。
感谢周华春教授这三年对我的细心指导,周老师为我明确的研究方向,为我
提供的研究资料和器材,为我端正的思想态度都是研究生生涯中不可或缺的宝贵
财富,严谨治学的态度和行为让我在科研路途上未尝懈怠放松过。
感谢父母对我的养育之恩,对二十余年不求回报的付出,无条件支持鼓励的
恩情,无法用简短的言语表达,是他们作为我最坚实的后盾,我才能没有后顾之
忧的完成研究生阶段的学业和科研任务。
感谢实验室的各位同学,陪伴了我三年的科研时间,为我的生活增添了无数
欢声笑语。在往后的时光中每当有难过时就应该会想起这段光辉的岁月。
感谢将对本文论进行评审的专家与教授,感谢您付出的时间与精力对本文论
进行审阅。
![](https://csdnimg.cn/release/download_crawler_static/89048907/bg3.jpg)
摘要
v
摘要
随着 5G 技术的快速发展,网络空间安全威胁日益严重,分布式拒绝服务
(Distributed denial of service,DDoS)等网络攻击层出不穷。传统的检测技术和应
对措施大多仅针对攻击流量的缓解,无法及时有效地分析攻击者行为并记录威胁
情报,难以对抗复杂的网络攻击。如何构建一种知识库来收集 DDoS 攻击多维度
信息并描述其恶意行为成为网络安全领域的重点研究方向。
本文依托国家重点研发计划课题“基于身份的可信协议与恶意通信行为监控方
法”,提出了一种分布式 DDoS 网络攻击恶意行为知识库的构建方法,收集了五大
类共计 21 种攻击方式流量构建恶意流量检测库,分析了攻击多维度恶意行为构建
恶意流量行为库,基于 DDoS 开放威胁信令(DDoS Open Threat Signaling,DOTS)和
区块链技术构建了分布式知识传输、知识推理和关联查询等机制,验证了知识库对
DDoS 攻击在线检测的精确率和召回率均在 87%以上,具体工作如下:
首先,概述了知识库构建的整体框架,构建了恶意流量检测库和恶意流量行
为库来完成僵尸网络、应用层 DDoS、慢速 DDoS、分布式反射 DDoS 和网络/传输
层 DDoS 五大类主流 DDoS 攻击流量收集,以及特征维度、时间维度和空间维度
DDoS 攻击恶意行为描述功能;基于 DOTS 协议和基于区块链技术设计了两种知识
库分布式部署方案来实现知识库间数据传输;基于知识库存储的数据和结构设计
了多种知识库图谱关联查询、知识推理、和分布式节点更新等方面功能。
其次,参照提出的知识库构建框架实现了恶意流量检测库的数据导入和检测
结果可视化;构建了恶意流量行为库的流量行为知识图,恶意行为特征图,恶意
行为溯源图和实体行为感知图四张知识图谱及其接口;基于 DOTS 协议和基于区
块链技术部署了分布式知识库并实现了知识库间数据传输;构建了知识库查询、
数据更新、DDoS 攻击检测和知识推理功能。
最后,在搭建原型系统的基础上,验证了知识库的各项功能,测试比较了基
于 DOTS 协议的分布式知识库和基于区块链技术的分布式知识库在更新耗时、CPU
占用和内存消耗方面的性能,并对比了所提出的分布式知识库与其他主流图数据
库在存储和查询方面的性能。实验结果表明,本文提出的分布式知识库能够实现
知识库设计的各项功能,并具有较好的图构建性能。
关键词:DDoS;分布式;知识图谱;恶意行为知识库
![](https://csdnimg.cn/release/download_crawler_static/89048907/bg4.jpg)
ABSTRACT
vii
ABSTRACT
With the rapid development of 5G technology, cyberspace security threats are
becoming more and more serious, and network attacks such as distributed denial of
service (DDoS) emerge one after another. Most of the traditional detection technologies
and countermeasures are only aimed at mitigating attack traffic, and cannot analyze
attacker behavior and record threat intelligence in a timely and effective manner,
making it difficult to combat complex network attacks. How to build a knowledge base
to collect DDoS attack multi-dimensional information and describe its malicious
behavior has become a key research direction in the field of network security.
Relying on the national key research and development project subject "identity-based
trusted protocol and malicious communication behavior monitoring method", this paper
proposes a method for constructing a knowledge base of malicious behavior of
distributed DDoS network attacks, and collects five types of traffic construction with a
total of 21 attack methods. Malicious traffic detection library, which analyzes the multi-
dimensional malicious behavior of attacks and builds a malicious traffic behavior
library. Based on DDoS Open Threat Signaling (DOTS) and blockchain technology, it
builds distributed knowledge transmission, knowledge reasoning and correlation query,
etc. The mechanism has verified that the accuracy and recall rate of the knowledge base
for online detection of DDoS attacks are both above 87%. The specific work is as
follows:
First, the overall framework of knowledge base construction is outlined, and a
malicious traffic detection library and malicious traffic behavior library are constructed
to complete five major DDoS attacks: botnet, application layer DDoS, slow DDoS,
distributed reflection DDoS and network/transport layer DDoS Traffic collection, as
well as feature dimension, time dimension and space dimension DDoS attack malicious
behavior description function; based on DOTS protocol and based on blockchain
technology, two distributed deployment schemes of knowledge bases are designed to
realize data transmission between knowledge bases; based on knowledge base storage
The data and structure of a variety of knowledge base graph association query,
knowledge reasoning, and distributed node update and other functions are designed.
Secondly, referring to the proposed knowledge base construction framework, the data
import of the malicious traffic detection library and the visualization of the detection
results are realized; the traffic behavior knowledge graph, the malicious behavior
![](https://csdnimg.cn/release/download_crawler_static/89048907/bg5.jpg)
viii
feature graph, the malicious behavior traceability graph and the entity behavior
perception graph of the malicious traffic behavior database are constructed. Zhang
knowledge graph and its interface; based on DOTS protocol and blockchain technology,
distributed knowledge base is deployed and data transmission between knowledge bases
is realized; knowledge base query, data update, DDoS attack detection and knowledge
reasoning functions are constructed.
Finally, on the basis of building a prototype system, the functions of the knowledge
base are verified, and the test and comparison of the distributed knowledge base based
on DOTS protocol and the distributed knowledge base based on blockchain technology
are time-consuming to update, CPU usage and memory. consumption, and compared the
storage and query performance of the proposed distributed knowledge base with other
mainstream graph databases. The experimental results show that the distributed
knowledge base proposed in this paper can realize the functions of knowledge base
design, and has better graph construction performance.
KEYWORDS
:
DDoS;Distributed;Knowledge Graph;Malicious Behavior Knowledge
Base
剩余116页未读,继续阅读
资源评论
![avatar-default](https://csdnimg.cn/release/downloadcmsfe/public/img/lazyLogo2.1882d7f4.png)
![avatar](https://profile-avatar.csdnimg.cn/default.jpg!1)
![avatar-vip](https://csdnimg.cn/release/downloadcmsfe/public/img/user-vip.1c89f3c5.png)
小码叔
- 粉丝: 4636
- 资源: 1223
![benefits](https://csdnimg.cn/release/downloadcmsfe/public/img/vip-rights-1.c8e153b4.png)
下载权益
![privilege](https://csdnimg.cn/release/downloadcmsfe/public/img/vip-rights-2.ec46750a.png)
C知道特权
![article](https://csdnimg.cn/release/downloadcmsfe/public/img/vip-rights-3.fc5e5fb6.png)
VIP文章
![course-privilege](https://csdnimg.cn/release/downloadcmsfe/public/img/vip-rights-4.320a6894.png)
课程特权
![rights](https://csdnimg.cn/release/downloadcmsfe/public/img/vip-rights-icon.fe0226a8.png)
开通VIP
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助
![voice](https://csdnimg.cn/release/downloadcmsfe/public/img/voice.245cc511.png)
![center-task](https://csdnimg.cn/release/downloadcmsfe/public/img/center-task.c2eda91a.png)
安全验证
文档复制为VIP权益,开通VIP直接复制
![dialog-icon](https://csdnimg.cn/release/downloadcmsfe/public/img/green-success.6a4acb44.png)