Abstract
In order to improve the security of the distributed optical fiber sensing network, the self-adaptive detection of the fiber sensing network needs to be carried out, and an overlap detection algorithm under the APT attack of the distributed optical fiber sensing network based on the spectral characteristic component and the big data analysis is proposed. the large data sampling model of the network APT attack is constructed, the attack characteristics and the related properties of the distributed optical fiber sensing network virus are simulated by adopting the spectrum correlation characteristic detection and the large-data quantization characteristic coding, and the large-data fusion and feature extraction of the APT attack information are realized, the output abnormal characteristic detection of the distributed optical fiber sensing network is carried out through the feature extraction result, a distributed optical fiber sensing network intrusion large data statistical analysis model is constructed, and a narrow-band signal spectrum offset correction method is adopted, And calculating the connection probability density and the individual infection probability of the APT attack node, and improving the detection capability of the network APT attack. The simulation results show that the algorithm can effectively implement the network APT attack detection, improve the security detection capability of the network APT attack, and has a good network security protection capability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Huang, H., Lu, D., T., H.: Chover type law of iterated logarithm of NSD sequences. J. Jilin Univ. 56(05), 1113–1118 (2018). Science Edition
Li, X., Kang, Z.: Ultra low Power and High Linear LNA based on double Cross Coupling Capacitance feedback. Autom. Instrum. 7, 326–330 (2018)
Houg, X.F., Wang, H., Li, Y.: Research on efficient processing method of large amount of data based on HIVE and distributed Cluster. J. China Acad. Electron. Inform. Technol. 13(3), 315–320 (2018)
Zhao, L.X.: Research and implementation of vehicle-mounted Charger based on DSP. J. Power Supply 15(3), 158–162 (2017)
Guo, H.P., Dong, Y.D., Mao, H.T., et al.: Logistic discrimination based rare-class classification method. J. Chin. Comput. Syst. 37(1), 140–145 (2016)
Gao, N., He, Y.Y., Gao, L.: Deep learning method for intrusion detection in massive data. Appl. Res. Comput. 35(4), 1197–1200 (2018)
Zhang, Y.Z., You, R.: Wavelet variance analysis of EEG based on window function. Chin. J. Biomed. Eng. 23(2), 54–59 (2014)
Yang, L., Kong, Z., Shi, H.: Multi-controller dynamic deployment strategy of software defined spatial information network. Comput. Eng. 44(10), 58–63 (2018)
Liu, Y., Du, Z., Zhao, Q.: Bifurcation analysis of the ENSO recharge oscillator with time-delayed feedback. Appl. Math. Mech. 39(10), 1128–1136 (2018)
Niu, W., Zhang, X., Yang, G., et al.: Modeling attack process of advanced persistent threat using network evolution. IEICE Trans. Inf. Syst. 100(10), 2275–2286 (2017)
Shen, X., Qin, S.: Anomaly detection based on synthetic minority oversampling technique and deep belief network. J. Comput. Appl. 38(7), 1941–1945 (2018)
Yang, Y.H., Huang, H.Z., Shen, Q.N., et al.: Research on intrusion detection based on incremental GHSOM. Chin. J. Comput. 37(5), 1216–1224 (2014)
Liu, L., Liu, S.: Dynamic fuzzy clustering algorithm based on weight difference. J. Jilin Univ. 57(03), 574–582 (2019). (Scientific version)
Ma, Y., Zhang, Z., Lin, C.: Research progress in similarity join query of big data. J. Comput. Appl. 38(4), 978–986 (2018)
Du, Z., Zhao, Q.: Bifurcation analysis of the ENSO recharge oscillator with time-delayed feedback. Appl. Math. Mech. 39(10), 1128–1136 (2018)
Xu, X., Wang, S., Li, Y.: Identification and predication of network attack patterns in software-defined networking. Peer-to-Peer Netw. Appl. 12(1), 1–11 (2018)
Bang, J., Cho, Y.-J., Kang, K.: Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a Hidden semi-Markov Model. Comput. Secur. 65(6), 108–120 (2017)
Yin, C., Xia, L., Zhang, S., et al.: Improved clustering algorithm based on high-speed network data stream. Soft. Comput. 22(4), 1–11 (2017)
Park, Y.H., Yun, I.D.: Arrhythmia detection in electrocardiogram based on recurrent neural network encoder–decoder with Lyapunov exponent. IEEJ Trans. Elect. Electron. Eng. 14(2), 1273–1274 (2019)
Brito, C.J., Miarka, B., de Durana, A.L.D., et al.: Home advantage in Judo: analysis by the combat phase, penalties and the type of attack. J. Hum. Kinet. 57(1), 213–220 (2017)
Author information
Authors and Affiliations
Contributions
2019 Guangdong Higher Education Teaching Reform Project “Research on Network Database Learning Based on Learning Behavior Big Data Visualization”; 2019 Huali College Guangdong University of Technology Project “Research on Network Database Learning Based on Learning Behavior Big Data Visualization” (GGDHLYJZ[2019]No.32).
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Fan, Gg., Zhai, Jl. (2020). Network APT Attack Detection Based on Big Data Analysis. In: Zhang, YD., Wang, SH., Liu, S. (eds) Multimedia Technology and Enhanced Learning. ICMTEL 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 326. Springer, Cham. https://doi.org/10.1007/978-3-030-51100-5_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-51100-5_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-51099-2
Online ISBN: 978-3-030-51100-5
eBook Packages: Computer ScienceComputer Science (R0)