SIP Flooding Attack Detection Technology of Multi-agent System Covert Network Based on BiGRU Algorithm
Abstract The hidden network environment of multi-agent systems is complex and intricate. The data characteristics generated by SIP flood attacks may overlap and confuse with normal traffic characteristics, and the network traffic characteristics will dynamically change over time, thereby affecting t...
Saved in:
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer
2025-06-01
|
| Series: | International Journal of Computational Intelligence Systems |
| Subjects: | |
| Online Access: | https://doi.org/10.1007/s44196-025-00864-x |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850136397779828736 |
|---|---|
| author | Tong Wu Hengyu Liu Tong Li Wei Fan Dawei Hu Jianshi Bai |
| author_facet | Tong Wu Hengyu Liu Tong Li Wei Fan Dawei Hu Jianshi Bai |
| author_sort | Tong Wu |
| collection | DOAJ |
| description | Abstract The hidden network environment of multi-agent systems is complex and intricate. The data characteristics generated by SIP flood attacks may overlap and confuse with normal traffic characteristics, and the network traffic characteristics will dynamically change over time, thereby affecting the accuracy of SIP flood attack detection. Therefore, an SIP flood detection technique based on BiGRU algorithm is proposed for covert networks in multi-agent systems. This technology is divided into two levels of detection. The primary detection collects and analyzes the hidden network data of multi-agent systems, and determines whether the traffic is abnormal by calculating the Renyi entropy value; abnormal traffic enters the second-level attack detection stage, extracting abnormal traffic from multi-agent covert networks and using the BiGRU model to learn features bidirectionally to determine whether it is an SIP flooding attack. If it is, the result of the SIP flooding attack on the multi-agent covert network is output. The experimental results show that this technology can accurately determine abnormal traffic and accurately detect the time, attacker IP, and attack frequency of SIP flooding attacks in the hidden network of multi-agent systems. The application effect is good. |
| format | Article |
| id | doaj-art-3cda51ea10cc40f7af4040fa8b0464fe |
| institution | OA Journals |
| issn | 1875-6883 |
| language | English |
| publishDate | 2025-06-01 |
| publisher | Springer |
| record_format | Article |
| series | International Journal of Computational Intelligence Systems |
| spelling | doaj-art-3cda51ea10cc40f7af4040fa8b0464fe2025-08-20T02:31:09ZengSpringerInternational Journal of Computational Intelligence Systems1875-68832025-06-0118111910.1007/s44196-025-00864-xSIP Flooding Attack Detection Technology of Multi-agent System Covert Network Based on BiGRU AlgorithmTong Wu0Hengyu Liu1Tong Li2Wei Fan3Dawei Hu4Jianshi Bai5Northeastern UniversityElectric Power Research Institute of State Grid Liaoning Electric Power Co., Ltd.Electric Power Research Institute of State Grid Liaoning Electric Power Co., Ltd.Electric Power Research Institute of State Grid Liaoning Electric Power Co., Ltd.Electric Power Research Institute of State Grid Liaoning Electric Power Co., Ltd.State Grid Liaoning Electric Power Co., Ltd.Abstract The hidden network environment of multi-agent systems is complex and intricate. The data characteristics generated by SIP flood attacks may overlap and confuse with normal traffic characteristics, and the network traffic characteristics will dynamically change over time, thereby affecting the accuracy of SIP flood attack detection. Therefore, an SIP flood detection technique based on BiGRU algorithm is proposed for covert networks in multi-agent systems. This technology is divided into two levels of detection. The primary detection collects and analyzes the hidden network data of multi-agent systems, and determines whether the traffic is abnormal by calculating the Renyi entropy value; abnormal traffic enters the second-level attack detection stage, extracting abnormal traffic from multi-agent covert networks and using the BiGRU model to learn features bidirectionally to determine whether it is an SIP flooding attack. If it is, the result of the SIP flooding attack on the multi-agent covert network is output. The experimental results show that this technology can accurately determine abnormal traffic and accurately detect the time, attacker IP, and attack frequency of SIP flooding attacks in the hidden network of multi-agent systems. The application effect is good.https://doi.org/10.1007/s44196-025-00864-xBiGRU algorithmMulti-agentCovert networkSIP flooding attackRenyi entropyFeature extraction |
| spellingShingle | Tong Wu Hengyu Liu Tong Li Wei Fan Dawei Hu Jianshi Bai SIP Flooding Attack Detection Technology of Multi-agent System Covert Network Based on BiGRU Algorithm International Journal of Computational Intelligence Systems BiGRU algorithm Multi-agent Covert network SIP flooding attack Renyi entropy Feature extraction |
| title | SIP Flooding Attack Detection Technology of Multi-agent System Covert Network Based on BiGRU Algorithm |
| title_full | SIP Flooding Attack Detection Technology of Multi-agent System Covert Network Based on BiGRU Algorithm |
| title_fullStr | SIP Flooding Attack Detection Technology of Multi-agent System Covert Network Based on BiGRU Algorithm |
| title_full_unstemmed | SIP Flooding Attack Detection Technology of Multi-agent System Covert Network Based on BiGRU Algorithm |
| title_short | SIP Flooding Attack Detection Technology of Multi-agent System Covert Network Based on BiGRU Algorithm |
| title_sort | sip flooding attack detection technology of multi agent system covert network based on bigru algorithm |
| topic | BiGRU algorithm Multi-agent Covert network SIP flooding attack Renyi entropy Feature extraction |
| url | https://doi.org/10.1007/s44196-025-00864-x |
| work_keys_str_mv | AT tongwu sipfloodingattackdetectiontechnologyofmultiagentsystemcovertnetworkbasedonbigrualgorithm AT hengyuliu sipfloodingattackdetectiontechnologyofmultiagentsystemcovertnetworkbasedonbigrualgorithm AT tongli sipfloodingattackdetectiontechnologyofmultiagentsystemcovertnetworkbasedonbigrualgorithm AT weifan sipfloodingattackdetectiontechnologyofmultiagentsystemcovertnetworkbasedonbigrualgorithm AT daweihu sipfloodingattackdetectiontechnologyofmultiagentsystemcovertnetworkbasedonbigrualgorithm AT jianshibai sipfloodingattackdetectiontechnologyofmultiagentsystemcovertnetworkbasedonbigrualgorithm |