Skip to main content

Network APT Attack Detection Based on Big Data Analysis

  • Conference paper
  • First Online:
Multimedia Technology and Enhanced Learning (ICMTEL 2020)

Abstract

In order to improve the security of the distributed optical fiber sensing network, the self-adaptive detection of the fiber sensing network needs to be carried out, and an overlap detection algorithm under the APT attack of the distributed optical fiber sensing network based on the spectral characteristic component and the big data analysis is proposed. the large data sampling model of the network APT attack is constructed, the attack characteristics and the related properties of the distributed optical fiber sensing network virus are simulated by adopting the spectrum correlation characteristic detection and the large-data quantization characteristic coding, and the large-data fusion and feature extraction of the APT attack information are realized, the output abnormal characteristic detection of the distributed optical fiber sensing network is carried out through the feature extraction result, a distributed optical fiber sensing network intrusion large data statistical analysis model is constructed, and a narrow-band signal spectrum offset correction method is adopted, And calculating the connection probability density and the individual infection probability of the APT attack node, and improving the detection capability of the network APT attack. The simulation results show that the algorithm can effectively implement the network APT attack detection, improve the security detection capability of the network APT attack, and has a good network security protection capability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Huang, H., Lu, D., T., H.: Chover type law of iterated logarithm of NSD sequences. J. Jilin Univ. 56(05), 1113–1118 (2018). Science Edition

    MathSciNet  Google Scholar 

  2. Li, X., Kang, Z.: Ultra low Power and High Linear LNA based on double Cross Coupling Capacitance feedback. Autom. Instrum. 7, 326–330 (2018)

    Google Scholar 

  3. Houg, X.F., Wang, H., Li, Y.: Research on efficient processing method of large amount of data based on HIVE and distributed Cluster. J. China Acad. Electron. Inform. Technol. 13(3), 315–320 (2018)

    Google Scholar 

  4. Zhao, L.X.: Research and implementation of vehicle-mounted Charger based on DSP. J. Power Supply 15(3), 158–162 (2017)

    Google Scholar 

  5. Guo, H.P., Dong, Y.D., Mao, H.T., et al.: Logistic discrimination based rare-class classification method. J. Chin. Comput. Syst. 37(1), 140–145 (2016)

    Google Scholar 

  6. Gao, N., He, Y.Y., Gao, L.: Deep learning method for intrusion detection in massive data. Appl. Res. Comput. 35(4), 1197–1200 (2018)

    Google Scholar 

  7. Zhang, Y.Z., You, R.: Wavelet variance analysis of EEG based on window function. Chin. J. Biomed. Eng. 23(2), 54–59 (2014)

    Google Scholar 

  8. Yang, L., Kong, Z., Shi, H.: Multi-controller dynamic deployment strategy of software defined spatial information network. Comput. Eng. 44(10), 58–63 (2018)

    Google Scholar 

  9. Liu, Y., Du, Z., Zhao, Q.: Bifurcation analysis of the ENSO recharge oscillator with time-delayed feedback. Appl. Math. Mech. 39(10), 1128–1136 (2018)

    Google Scholar 

  10. Niu, W., Zhang, X., Yang, G., et al.: Modeling attack process of advanced persistent threat using network evolution. IEICE Trans. Inf. Syst. 100(10), 2275–2286 (2017)

    Article  Google Scholar 

  11. Shen, X., Qin, S.: Anomaly detection based on synthetic minority oversampling technique and deep belief network. J. Comput. Appl. 38(7), 1941–1945 (2018)

    Google Scholar 

  12. Yang, Y.H., Huang, H.Z., Shen, Q.N., et al.: Research on intrusion detection based on incremental GHSOM. Chin. J. Comput. 37(5), 1216–1224 (2014)

    Google Scholar 

  13. Liu, L., Liu, S.: Dynamic fuzzy clustering algorithm based on weight difference. J. Jilin Univ. 57(03), 574–582 (2019). (Scientific version)

    MATH  Google Scholar 

  14. Ma, Y., Zhang, Z., Lin, C.: Research progress in similarity join query of big data. J. Comput. Appl. 38(4), 978–986 (2018)

    Google Scholar 

  15. Du, Z., Zhao, Q.: Bifurcation analysis of the ENSO recharge oscillator with time-delayed feedback. Appl. Math. Mech. 39(10), 1128–1136 (2018)

    Google Scholar 

  16. Xu, X., Wang, S., Li, Y.: Identification and predication of network attack patterns in software-defined networking. Peer-to-Peer Netw. Appl. 12(1), 1–11 (2018)

    Google Scholar 

  17. Bang, J., Cho, Y.-J., Kang, K.: Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a Hidden semi-Markov Model. Comput. Secur. 65(6), 108–120 (2017)

    Article  Google Scholar 

  18. Yin, C., Xia, L., Zhang, S., et al.: Improved clustering algorithm based on high-speed network data stream. Soft. Comput. 22(4), 1–11 (2017)

    Google Scholar 

  19. Park, Y.H., Yun, I.D.: Arrhythmia detection in electrocardiogram based on recurrent neural network encoder–decoder with Lyapunov exponent. IEEJ Trans. Elect. Electron. Eng. 14(2), 1273–1274 (2019)

    Article  Google Scholar 

  20. Brito, C.J., Miarka, B., de Durana, A.L.D., et al.: Home advantage in Judo: analysis by the combat phase, penalties and the type of attack. J. Hum. Kinet. 57(1), 213–220 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

2019 Guangdong Higher Education Teaching Reform Project “Research on Network Database Learning Based on Learning Behavior Big Data Visualization”; 2019 Huali College Guangdong University of Technology Project “Research on Network Database Learning Based on Learning Behavior Big Data Visualization” (GGDHLYJZ[2019]No.32).

Corresponding author

Correspondence to Guo-gen Fan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fan, Gg., Zhai, Jl. (2020). Network APT Attack Detection Based on Big Data Analysis. In: Zhang, YD., Wang, SH., Liu, S. (eds) Multimedia Technology and Enhanced Learning. ICMTEL 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 326. Springer, Cham. https://doi.org/10.1007/978-3-030-51100-5_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-51100-5_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-51099-2

  • Online ISBN: 978-3-030-51100-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics