• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种经济高效的自适应修复策略,以减轻具备分布式拒绝服务能力的物联网僵尸网络的影响。

A cost-effective adaptive repair strategy to mitigate DDoS-capable IoT botnets.

作者信息

Hu Jiamin, Yang Xiaofan

机构信息

School of Big Data & Software Engineering, Chongqing University, Chongqing, China.

出版信息

PLoS One. 2024 Dec 26;19(12):e0301888. doi: 10.1371/journal.pone.0301888. eCollection 2024.

DOI:10.1371/journal.pone.0301888
PMID:39724180
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11670966/
Abstract

Distributed denial of service (DDoS) is a type of cyberattack in which multiple compromised systems flood the bandwidth or resources of a single system, making the flooded system inaccessible to legitimate users. Since large-scale botnets based on the Internet of Things (IoT) have been hotbeds for launching DDoS attacks, it is crucial to defend against DDoS-capable IoT botnets effectively. In consideration of resource constraints and frequent state changes for IoT devices, they should be equipped with repair measures that are cost-effective and adaptive to mitigate the impact of DDoS attacks. From the mitigation perspective, we refer to the collection of repair costs at all times as a repair strategy. This paper is then devoted to studying the problem of developing a cost-effective and adaptive repair strategy (ARS). First, we establish an IoT botware propagation model that fully captures the state evolution of an IoT network under attack and defense interventions. On this basis, we model the ARS problem as a data-driven optimal control problem, aiming to realize both learning and prediction of propagation parameters based on network traffic data observed at multiple discrete time slots and control of IoT botware propagation to a desired infection level. By leveraging optimal control theory, we propose an iterative algorithm to solve the problem, numerically obtaining the learned time-varying parameters and a repair strategy. Finally, the performance of the learned parameters and the resulting strategy are examined through computer experiments.

摘要

分布式拒绝服务(DDoS)是一种网络攻击类型,其中多个受感染的系统会耗尽单个系统的带宽或资源,导致合法用户无法访问被耗尽资源的系统。由于基于物联网(IoT)的大规模僵尸网络一直是发起DDoS攻击的温床,因此有效防御具备DDoS攻击能力的物联网僵尸网络至关重要。考虑到物联网设备的资源限制和频繁的状态变化,它们应配备具有成本效益且适应性强的修复措施,以减轻DDoS攻击的影响。从缓解的角度来看,我们将随时收集修复成本称为一种修复策略。本文致力于研究制定具有成本效益且适应性强的修复策略(ARS)的问题。首先,我们建立了一个物联网僵尸软件传播模型,该模型充分捕捉了在攻击和防御干预下物联网网络的状态演变。在此基础上,我们将ARS问题建模为一个数据驱动的最优控制问题,旨在基于在多个离散时隙观察到的网络流量数据实现传播参数的学习和预测,并将物联网僵尸软件的传播控制到期望的感染水平。通过利用最优控制理论,我们提出了一种迭代算法来解决该问题,通过数值计算得到学习到的时变参数和一种修复策略。最后,通过计算机实验检验学习到的参数和所得策略的性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/b070cd5f3dac/pone.0301888.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/a94c35f13a85/pone.0301888.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/c8ace91a1e2c/pone.0301888.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/15953fb1301d/pone.0301888.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/c16aaa477fd3/pone.0301888.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/6b11f4e8a908/pone.0301888.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/85a4aa2df67c/pone.0301888.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/27d7ba099f92/pone.0301888.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/ab52335d7370/pone.0301888.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/9c5ca289ab0a/pone.0301888.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/6f78ac1aa4e9/pone.0301888.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/13d9af2d99a0/pone.0301888.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/4a2339cb1a24/pone.0301888.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/7e3f65d96e1c/pone.0301888.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/a331c95b7488/pone.0301888.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/b070cd5f3dac/pone.0301888.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/a94c35f13a85/pone.0301888.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/c8ace91a1e2c/pone.0301888.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/15953fb1301d/pone.0301888.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/c16aaa477fd3/pone.0301888.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/6b11f4e8a908/pone.0301888.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/85a4aa2df67c/pone.0301888.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/27d7ba099f92/pone.0301888.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/ab52335d7370/pone.0301888.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/9c5ca289ab0a/pone.0301888.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/6f78ac1aa4e9/pone.0301888.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/13d9af2d99a0/pone.0301888.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/4a2339cb1a24/pone.0301888.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/7e3f65d96e1c/pone.0301888.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/a331c95b7488/pone.0301888.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ec8e/11670966/b070cd5f3dac/pone.0301888.g015.jpg

相似文献

1
A cost-effective adaptive repair strategy to mitigate DDoS-capable IoT botnets.一种经济高效的自适应修复策略,以减轻具备分布式拒绝服务能力的物联网僵尸网络的影响。
PLoS One. 2024 Dec 26;19(12):e0301888. doi: 10.1371/journal.pone.0301888. eCollection 2024.
2
Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey.基于区块链的物联网(IoT)中减轻分布式拒绝服务(DDoS)攻击的解决方案:一项综述。
Sensors (Basel). 2022 Jan 31;22(3):1094. doi: 10.3390/s22031094.
3
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.基于自适应机器学习的支持软件定义网络的物联网分布式拒绝服务攻击检测与缓解系统
Sensors (Basel). 2022 Mar 31;22(7):2697. doi: 10.3390/s22072697.
4
DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology.利用以太坊区块链技术防止物联网设备的 DDoS 攻击。
Sensors (Basel). 2022 Sep 8;22(18):6806. doi: 10.3390/s22186806.
5
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices.基于软件定义网络的一对多策略,用于检测和缓解智能家居物联网设备中的分布式拒绝服务攻击
Sensors (Basel). 2024 Aug 3;24(15):5022. doi: 10.3390/s24155022.
6
Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques.物联网僵尸网络分布式拒绝服务攻击的系统文献综述及检测技术评估
Sensors (Basel). 2024 Jun 1;24(11):3571. doi: 10.3390/s24113571.
7
IFACNN: efficient DDoS attack detection based on improved firefly algorithm to optimize convolutional neural networks.IFACNN:基于改进萤火虫算法优化卷积神经网络的高效 DDoS 攻击检测。
Math Biosci Eng. 2022 Jan;19(2):1280-1303. doi: 10.3934/mbe.2022059. Epub 2021 Dec 2.
8
Lightweight Internet of Things Botnet Detection Using One-Class Classification.基于单类分类的轻量级物联网僵尸网络检测。
Sensors (Basel). 2022 May 10;22(10):3646. doi: 10.3390/s22103646.
9
BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning.增强集成机器学习的物联网系统网络攻击检测高效技术:BoostedEnML
Sensors (Basel). 2022 Sep 29;22(19):7409. doi: 10.3390/s22197409.
10
The proposed hybrid deep learning intrusion prediction IoT (HDLIP-IoT) framework.所提出的混合深度学习入侵预测物联网 (HDLIP-IoT) 框架。
PLoS One. 2022 Jul 29;17(7):e0271436. doi: 10.1371/journal.pone.0271436. eCollection 2022.

本文引用的文献

1
Modeling the impact of the habituation effect on information spreading processes with repeated contacts under an SI model.在 SI 模型下,通过重复接触模拟习惯化效应对信息传播过程的影响。
PLoS One. 2023 Apr 12;18(4):e0280266. doi: 10.1371/journal.pone.0280266. eCollection 2023.
2
Understanding and countering the spread of conspiracy theories in social networks: Evidence from epidemiological models of Twitter data.理解和抵制社交网络中的阴谋论传播:来自 Twitter 数据的流行病学模型证据。
PLoS One. 2021 Aug 12;16(8):e0256179. doi: 10.1371/journal.pone.0256179. eCollection 2021.
3
Networks and epidemic models.
网络与流行病模型。
J R Soc Interface. 2005 Sep 22;2(4):295-307. doi: 10.1098/rsif.2005.0051.