Abstract
This paper takes the electric power information network as the model of research, studies the captured data packets and the characteristics of data flow, analyzes the specific characteristics of the audit data from the angle of anomalynetwork traffic, and combines statistical variance method and regression analysis method to put forward an intrusion detection system on bases of distributed Network flow.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bawany, N.Z., Shamsi, J.A.: SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks. J. Netw. Comput. Appl. 145, 102381 (2019)
Conti, M., Lal, C., Mohammadi, R., Rawat, U.: Lightweight solutions to counter DDoS attacks in software defined networking. Wire. Netw. 25(5), 2751–2768 (2019)
Nabil, H.R., Kamoun, S.F.: DDoS flooding attack detection scheme based on F-divergence: Comput. Commun. 35(11), 1380–1391 (2012)
Yu, S., Zhou, W., Doss, R., Jia, W.: Traceback of DDoS attacks using entropy variations. IEEE Trans. Parallel Distrib. Syst. 22(3), 412–425 (2011)
Xiang, Y., Li, K., Zhou, W.: Low-Rate DDoS attacks detection and traceback by using new information metrics. IEEE Trans. Inf. Forensics Secur. 6(2), 426–437 (2011)
Zhang, C.W., Yin, J.P., Cai, Z.P., Chen, W.F.: RRED: Robust RED algorithm to counter low-rate denial-of-service attacks. IEEE Commun. Lett. 14(5), 489–491 (2010)
Ramadhan, G., Kurniawan, Y., Kim, C.S.: Design of TCP SYN Flood DDo S attack detection using artificial immune systems. In: International Conference on Frontiers of Information Technology (2016)
Kumar, M., Tripathi, S., Agrawal, N., Singh, S.N.: Growth of premature neonates admitted in a level III neonatal unit. Clin. Epidemiol. Glob. Health 2(2), 56–60 (2014)
Ji, Q.J., Dong, Y.Q.: A load-adaptive active queue management algorithm. J. Softw. 17(5), 1140–1148 (2006)
Buragohain, C., Yoti, M.J., Singh, S., et al.: Anomaly based DDoS attack detection. Int. J. Comput. Applications (2015)
Sun, Z.X., Li, Q.D.: Defending DDos attacks based on the source and destination IP address database. J. Softw. 18(10), 2613–2623 (2007)
Minghui, Y., Ruchuan, R.: DDoS detection based on wavelet kernel support vector machine. J. Chin. Univ. Posts Telecommun. 15(3), 59–94 (2008)
LU, N., Wang, Y., Shi, W., Diao, D.: Filtering location optimization for defending against large-scale BDoS attacks. Chin. J. Electron. 26(2), 435–444 (2017)
Li, M. Li M.: An adaptive approach for defending against DDoS attacks (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yu, S., Taojun, Lulu, Z. (2021). Study on Distributed Intrusion Detection Systems of Power Information Network. In: Liu, Q., Liu, X., Shen, T., Qiu, X. (eds) The 10th International Conference on Computer Engineering and Networks. CENet 2020. Advances in Intelligent Systems and Computing, vol 1274. Springer, Singapore. https://doi.org/10.1007/978-981-15-8462-6_99
Download citation
DOI: https://doi.org/10.1007/978-981-15-8462-6_99
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8461-9
Online ISBN: 978-981-15-8462-6
eBook Packages: EngineeringEngineering (R0)