2018
DOI: 10.1007/978-3-030-00009-7_59
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…Note that traditional network situation assessment methods cannot effectively assess the security situation of distributed denial of service (DDoS) attacks. Zhang et al 14 proposed a DDoS attack security situation assessment model based on the fusion features of fuzzy clustering algorithms. Their model can reasonably and effectively evaluate the security status of DDoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Note that traditional network situation assessment methods cannot effectively assess the security situation of distributed denial of service (DDoS) attacks. Zhang et al 14 proposed a DDoS attack security situation assessment model based on the fusion features of fuzzy clustering algorithms. Their model can reasonably and effectively evaluate the security status of DDoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Also, Jieren C. proposed an DDoS detection method for socially aware networking [15] and a method using flow correlation degree [16]. Ruizhi Z. presented a DDoS attack security situation assessment model [17] that formed the basic evaluation solution to the attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Also, Jieren C. proposed an DDoS detection method for socially aware networking [15] and a method using flow correlation degree [16]. Ruizhi Z. presented a DDoS attack security situation assessment model [17] that formed the basic evaluation solution to the attacks.Security detection is an important tool that can strengthen the security of information and communication in networks [18][19][20][21][22]. The purpose of security detection is detecting the attacks with high efficiency, high reliability, and low cost, by implementing corresponding detection mechanisms.…”
mentioning
confidence: 99%
“…Li et al [Li and Zhao (2016)] proposed a method to obtain observations value through sliding time window, then through Multiple Population Genetic Algorithm (MPGA) for obtaining HMM parameters, thus improved the reliability of parameters. Zhang et al [Zhang, Cheng, Tang et al (2018)] proposed one algorithm to evaluate situation of DDoS, which improved Fuzzy C-means clustering algorithm. Sara et al [Sara, Jose and Skarmeta (2018)] to solve problems of large-scale Internet of Things deployment, proposed a security certification method which was designed for IoT,this method could evaluate the security grade of a device automatically.…”
Section: Related Workmentioning
confidence: 99%