scholarly journals Can Wavelet Transform Detect LDDoS Abnormal Traffic in Multipath TCP Transmission System?

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Gang Lei ◽  
Lejun Ji ◽  
Ruiwen Ji ◽  
Yuanlong Cao ◽  
Wei Yang ◽  
...  

With the rapid development of mobile Internet technology and multihost terminal devices, multipath transmission protocol has been widely concerned. Among them, multipath TCP (MPTCP) has become a hot research protocol in recent years because of its good transmission performance and Internet compatibility. Due to the increasing power of Low-Rate Distributed Denial of Service (LDDoS) attack, the network security situation is becoming increasingly serious. The robustness of MPTCP network has become an urgent performance index to improve. Therefore, it is very necessary to detect LDDoS abnormal traffic timely and effectively in the transmission system based on MPTCP. This paper tries to use wavelet transform technology to decompose and reconstruct network traffic and find a detection method of LDDoS abnormal traffic in the MPTCP transmission system. The experimental results show that in the MPTCP transmission system, the signal processing technology based on wavelet transform can realize the identification of LDDoS abnormal traffic. It indicates a direction worth further exploration for the detection and defense of the LDDoS attack.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Gang Lei ◽  
Lejun Ji ◽  
Ruiwen Ji ◽  
Yuanlong Cao ◽  
Xun Shao ◽  
...  

The multipath TCP (MPTCP) enables multihomed mobile devices to realize multipath parallel transmission, which greatly improves the transmission performance of the mobile communication network. With the rapid development of all kinds of emerging technologies, network attacks have shown a trend of development with many types and rapid updates. Among them, low-rate distributed denial of service (LDDoS) attacks are considered to be one of the most threatening issues in the field of network security. In view of the current research status, by using the network simulation software NS2, this paper first compares and analyzes the throughput and delay performance of the MPTCP transmission system under LDDoS attacks and, further, conducts simulation experiments and analysis on the queue occupancy rate of the LDDoS attack flow to extract the basic attack characteristics of the LDDoS attacks. The experimental results show that the LDDoS attacks will have a major destructive effect on the throughput performance and delay performance of the MPTCP transmission system, resulting in a decrease in the robustness of the transmission system. By analyzing and comparing the occupancy rate of the LDDoS attack flow in the MPTCP transmission system, it can be concluded that (1) the occupancy rate of the LDDoS scattered pulse traffic sent by each puppet machine changes slightly, and (2) the occupancy rate of LDDoS attack data flow is much greater than that of ordinary TCP data flow.



2020 ◽  
Vol 12 (16) ◽  
pp. 6333
Author(s):  
Chan Liu ◽  
Raymond K. H. Chan ◽  
Maofu Wang ◽  
Zhe Yang

Harnessing the rapid development of mobile internet technology, the sharing economy has experienced unprecedented growth in the global economy, especially in China. Likely due to its increasing popularity, more and more businesses have adopted this label in China. There is a concern as to the essential meaning of the sharing economy. As it is difficult to have a universally accepted definition, we aim to map the sharing economy and demystify the use of it in China in this paper. We propose seven organizing essential elements of the sharing economy: access use rights instead of ownership, idle capacity, short term, peer-to-peer, Internet platforms mediated, for monetary profit, and shared value orientation. By satisfying all or only parts of these elements, we propose one typology of sharing economy, and to differentiate bona fide sharing economy from quasi- and pseudo-sharing economy. Finally, there are still many problems that need to be solved urgently in the real sharing economy from the perspective of the government, companies and individuals.



2018 ◽  
Vol 173 ◽  
pp. 02029
Author(s):  
XU Jiahui ◽  
YU Hongyuan ◽  
WANG Gang ◽  
WANG Zi ◽  
BAI Jingjie ◽  
...  

The rapid development of mobile Internet technology and the wide spread of smart terminals have brought opportunities for the transformation of power grid business model. Compared to the non-real-time information, the real-time and running data of dispatch and control domain is easy to be intercepted and cracked. To solve this problem, this paper presents a new approach to mobile application security framework for the power grid control field. It is to realize secondary encryption by using the method of MD5+AES mixed encryption algorithm and combining the time stamp in real-time data transmission process. At the same time it is to prevent cross-border operations and brute force by using Token authentication and Session technology. China EPRI safety test results show that the application of the framework significantly improves the integrity, safety and reliability of real-time data in power grid control.



2013 ◽  
Vol 336-338 ◽  
pp. 2099-2102
Author(s):  
Hui Xin Ning

With the Rapid Development of Mobile Internet Technology, People Hope Access to Internet to get Information and Service Anywhere and Anytime Urgently. Catering Industry also Hopes to Expand the Scope of Business to Network. in this Paper, through the Requirement Analysis, Using the Currently Popular Android System as the Platform, the Authors Study the Mobile Ordering System Based on Android with the Help of Mobile Internet Technology. the System was Considered the Relationship between the Customers and the Sellers, had Established a Perfect Management Mode and Comprehensive Ordering Function, and Realized the Characteristic Function Based on Google Service. the System is Low Cost, Simple Operation, and Mobility. it Solves the Catering Industry’s Problems of High Cost on Manpower and Inconvenient Online Ordering.



2021 ◽  
Vol 2066 (1) ◽  
pp. 012029
Author(s):  
Dawei Song ◽  
Xun Zhu ◽  
Fengjuan Ma

Abstract with the rise and rapid development of mobile communication, intelligent terminal and data system, we are entering the era of mobile Internet. In recent years, more and more data need to be processed and transmitted in daily life, and structured data is becoming more and more important. Among them, multi-mode matching technology can search data in a wider range. Matching for multiple patterns at a time avoids unnecessary matching, accelerates the matching process, and helps to find longer matching information and obtain higher accuracy. This paper mainly introduces the high camouflage intrusion detection method of structured database based on multi-mode matching. This paper uses the high disguised intrusion detection method of structured database based on multi-mode matching, collects sensitive information of wireless access points and stations through the communication of WLAN in multimodal matching, then intercepts and forges data packets to initiate replay attack. Replay attack is characterized by abnormal traffic in the network, which can be detected by statistical analysis. The experimental results show that the high camouflage intrusion detection method based on multi-mode matching makes the camouflage intrusion detection rate increase by 23%. The limitations of the design and research of camouflage intrusion detection are analyzed, discussed and summarized, so as to enrich the academic research results.



With the rapid development of mobile Internet technology, mobile network data traffic presents an explosive growth trend. Especially, the proportion of mobile video business has become a large proportion in mobile Internet business. Mobile video business is considered as a typical business in the 5G network, such as in online education. The growth of video traffic poses a great challenge to mobile network. In order to provide users with better quality of experience (QoE), it requires mobile network to provide higher data transmission rate and lower network delay. This paper adopts a combined optimization to minimize total cost and maximize QoE simultaneously. The optimization problem is solved by ant colony algorithm. The effectiveness is verified on experiment.



2014 ◽  
Vol 543-547 ◽  
pp. 3441-3444
Author(s):  
Ying Li Wang ◽  
Zhi Jiang Xu ◽  
Si Si Li

The rapid development of 3 g mobile internet technology and the extensive use of intelligent mobile phone system make a user access the Internet not only can through a computer which has networking conditions, but also can through the mobile phone whenever and wherever. This paper designed and developed the method of accessing to the Web server based on the Android platform, it provides a quick and convenient way for the developers.



2017 ◽  
Vol 14 (2) ◽  
pp. 45-66 ◽  
Author(s):  
Mingjun Xin ◽  
Yanhui Zhang ◽  
Shunxiang Li ◽  
Liyuan Zhou ◽  
Weimin Li

Nowadays, location based services (LBS) has become one of the most popular applications with the rapid development of mobile Internet technology. More and more research is focused on discovering the required services among massive information according to the personalized behavior. In this paper, a collaborative filtering (CF) recommendation algorithm is presented based on the Location-aware Hidden Markov Model (LHMM). This approach includes three main stages. First, it clusters users by making a pattern similarity calculation of their historical check-in data. Then, it establishes the location-aware transfer matrix so as to get the next most similar service. Furthermore, it integrates the generated LHMM, user's score and interest migration into the traditional CF algorithm so as to generate a final recommendation list. The LHMM-based CF algorithm mixes the geographic factors and personalized behavior and experimental results show that it outperforms the state-of-the-art algorithms on both precision and recall.



2014 ◽  
Vol 926-930 ◽  
pp. 2622-2625
Author(s):  
Xue Ni

With the rapid development of Internet technology, network transactions are in increasing breadth and depth. Online trading market transactions as a new way to bring great economic benefits to society, but also to enter into the market for traditional legal face great challenges. Network of consumer protection in the transaction there is no protection of personal privacy, personal property, security risks, right, fair trading rights (the main form of contract) damages, rights have been infringed. In this paper, comparative research methods, introduced online trading, online trading, e-commerce and the difference between the three links to the special nature of the transaction through the network analysis and network transaction concrete manifestation of consumers 'interests to explore our network Trading in consumer protection are the main problems facing the proposed line with China's national conditions and consumer rights protection network transactions legislative proposals.



2015 ◽  
Vol 733 ◽  
pp. 825-829
Author(s):  
Bin Ni

With the social development and progress, fire institutions, including colleges and universities, including office automation platform, which the functions needed to support the business more and more, need to use multilevel menu for management platform. In addition, with the rapid development of mobile Internet technology, people access to office automation platform approach is also increasingly diverse, due to the hardware and software configuration of various access devices larger difference, which requires multi-level menu office automation platform consumes fewer resources simple operation, good scalability. Now, we use the idea of finite state machines to achieve a small footprint, scalability, simple switching office automation platform colleges Fire multi-level menu management system.



Sign in / Sign up

Export Citation Format

Share Document