[1]王春东,郑泽霖.基于优化的堆叠集成区块链DDoS攻击检测方法[J].计算机技术与发展,2025,(02):54-62.[doi:10.20165/j.cnki.ISSN1673-629X.2024.0310]
 WANG Chun-dong,ZHENG Ze-lin.Optimized Stacking Ensemble Learning Blockchain DDoS Attack Detection Method[J].,2025,(02):54-62.[doi:10.20165/j.cnki.ISSN1673-629X.2024.0310]
点击复制

基于优化的堆叠集成区块链DDoS攻击检测方法()

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2025年02期
页码:
54-62
栏目:
网络空间安全
出版日期:
2025-02-10

文章信息/Info

Title:
Optimized Stacking Ensemble Learning Blockchain DDoS Attack Detection Method
文章编号:
1673-629X(2025)02-0054-09
作者:
王春东123郑泽霖13
1. 天津理工大学 计算机科学与工程学院,天津 300384;
2. 天津公安警官职业学院,天津 300382;
3. 计算机病毒防治技术国家工程实验室,天津 300384
Author(s):
WANG Chun-dong123ZHENG Ze-lin13
1. School of Computer Science and Engineering,Tianjin University of Technology,Tianjin 300384,China;
2. Tianjin Public Security Police Profession College,Tianjin 300382,China;
3. National Engineering Laboratory for Computer Virus Prevention and Control Technology,Tianjin 300384,China
关键词:
网络空间安全区块链DDoS攻击检测集成学习堆叠算术优化算法
Keywords:
cyberspace security blockchain distribute denial of service attack detection ensemble learning stacking arithmetic optimization algorithm
分类号:
TP309
DOI:
10.20165/j.cnki.ISSN1673-629X.2024.0310
摘要:
分布式拒绝服务(Distribute Denial of Service,DDoS)攻击是常见的网络攻击手段之一,对于影响力日益增长的区块链网络构成了较大的威胁。 包含堆叠法(Stacking)在内的集成学习模型在 DDoS 攻击检测方面有很大前景,而 Stacking 在面对不同类型数据集时需要调整学习器组合。 该文使用 Stacking 方法检测区块链 DDoS 攻击,利用贝叶斯优化确定各学习器超参数,同时还使用算术优化算法(Arithmetic Optimization Algorithm,AOA)选择基学习器的组合,来解决需要手动调节学习器的问题。 在区块链网络攻击流量数据集和比特币交易所交易数据上分别进行了实验,通过准确率、攻击数据漏报率和宏平均精准率三种评价指标进行对比,该方法在这两种不同类型数据集上的性能均优于其他三种常见的集成学习算法。 还通过改变实验数据集大小探究出攻击检测性能会随着数据集的增大而上升。 通过实验可以证明该方法可以有效检测不同类型数据集上的区块链 DDoS 攻击。
Abstract:
Distribute Denial of Service (DDoS) is one of the common network attack methods,which poses a significant threat to the in-creasingly influential blockchain network. Ensemble learning models,including the Stacking method,have great potential in DDoS attack detection,and Stacking requires adjusting the combination of learners when facing different types of datasets. We use the Stacking method to detect blockchain DDoS attacks, use Bayesian optimization to determine the hyperparameters of each learner, and also use the Arithmetic Optimization Algorithm (AOA) to select a combination of base learners to solve the problem of manually adjusting learners.The experiments are conducted on blockchain network attack traffic datasets and Bitcoin exchange trading data,and the comparison is carried out by three evaluation indicators: accuracy, attack data omission rate,and macro average accuracy. The proposed method is superior to the other three common ensemble learning algorithms in terms of performance on these two different types of datasets. We also explore how the attack detection performance increases with the increase of the experimental dataset size. Through experiments,it can be proven that the proposed method can effectively detect blockchain DDoS attacks on different types of datasets.

相似文献/References:

[1]翟社平,李兆兆,段宏宇,等.区块链关键技术中的数据一致性研究[J].计算机技术与发展,2018,28(09):94.[doi:10.3969/ j. issn.1673-629X.2018.09.020]
 ZHAI She-ping,LI Zhao-zhao,DUAN Hong-yu,et al.Research on Data Consistency of Key Technologies of Blockchain[J].,2018,28(02):94.[doi:10.3969/ j. issn.1673-629X.2018.09.020]
[2]陈春玲,沈阳,余瀚.去中心化的征信系统模型研究[J].计算机技术与发展,2019,29(03):122.[doi:10.3969/ j. issn.1673-629X.2019.03.026]
 CHEN Chun-ling,SHEN Yang,YU Han.Research on Decentralized Model for Credit Information System[J].,2019,29(02):122.[doi:10.3969/ j. issn.1673-629X.2019.03.026]
[3]董蓉,苑明海,周灼.基于区块链的云制造信息数据记录技术[J].计算机技术与发展,2019,29(05):97.[doi:10. 3969 / j. issn. 1673-629X. 2019. 05. 021]
 DONG Rong,YUAN Ming-hai,ZHOU Zhuo.Cloud Manufacturing Service Transaction Information Recording Technology Based on Block Chain[J].,2019,29(02):97.[doi:10. 3969 / j. issn. 1673-629X. 2019. 05. 021]
[4]董黛莹,汪学明.基于区块链的电子医疗记录共享研究[J].计算机技术与发展,2019,29(05):121.[doi:10. 3969 / j. issn. 1673-629X. 2019. 05. 026]
 DONG Dai-ying,WANG Xue-ming.Research on Electronic Medical Record Sharing Model Based on Blockchain[J].,2019,29(02):121.[doi:10. 3969 / j. issn. 1673-629X. 2019. 05. 026]
[5]宁 卓,李牧阳.基于联盟区块链的物流信息平台 LIP-Chain[J].计算机技术与发展,2019,29(08):190.[doi:10. 3969 / j. issn. 1673-629X. 2019. 08. 036]
 NING Zhuo,LI Mu-yang.LIP-Chain:A Logistics Information Platform Based on Permissioned Blockchain[J].,2019,29(02):190.[doi:10. 3969 / j. issn. 1673-629X. 2019. 08. 036]
[6]李青鹏,赵相福,陈中育,等.基于区块链的网约车安全风险规避模式[J].计算机技术与发展,2019,29(09):152.[doi:10. 3969 / j. issn. 1673-629X. 2019. 09. 029]
 LI Qing-peng,ZHAO Xiang-fu,CHEN Zhong-yu,et al.Risk Avoidance for Safe Network Car System Based on Blockchain[J].,2019,29(02):152.[doi:10. 3969 / j. issn. 1673-629X. 2019. 09. 029]
[7]魏 艳,毛燕琴,沈苏彬.一种基于区块链的数据完整性验证解决方案[J].计算机技术与发展,2020,30(01):76.[doi:10. 3969 / j. issn. 1673-629X. 2020. 01. 014]
 WEI Yan,MAO Yan-qin,SHEN Su-bin.A Data Integrity Verification Solution Based on Blockchain[J].,2020,30(02):76.[doi:10. 3969 / j. issn. 1673-629X. 2020. 01. 014]
[8]张富宝,李 国,王滔滔.基于区块链技术的电动汽车充电链[J].计算机技术与发展,2020,30(04):161.[doi:10. 3969 / j. issn. 1673-629X. 2020. 04. 031]
 ZHANG Fu-bao,LI Guo,WANG Tao-tao.Electric Vehicle Charging Chain Based on Blockchain Technology[J].,2020,30(02):161.[doi:10. 3969 / j. issn. 1673-629X. 2020. 04. 031]
[9]贾花萍.“区块链+电商”在渭南市农产品电商领域的应用[J].计算机技术与发展,2020,30(06):191.[doi:10. 3969 / j. issn. 1673-629X. 2020. 06. 037]
 JIA Hua-ping.Application of “Blockchain+E-commerce” in E-commerce of Agricultural Products in Weinan[J].,2020,30(02):191.[doi:10. 3969 / j. issn. 1673-629X. 2020. 06. 037]
[10]汪 菲,沈苏彬.一种基于区块链的可信数据共享解决方案[J].计算机技术与发展,2020,30(09):115.[doi:10. 3969 / j. issn. 1673-629X. 2020. 09. 021]
 WANG Fei,SHEN Su-bin.A Solution for Decentralized Data Sharing Based on Blockchain[J].,2020,30(02):115.[doi:10. 3969 / j. issn. 1673-629X. 2020. 09. 021]

更新日期/Last Update: 2025-02-10