期刊文献+

基于统计的网络流量模型及异常流量发现 被引量:2

Statistics based network traffic model and anomaly traffic detection
在线阅读 下载PDF
导出
摘要 基于从网络流量的大小和流量曲线的形状两个方面的研究,建立了一种基于统计的网络流量模型,提出了计算正常情况网络流量曲线的算法。通过对比正常网络流量曲线和异常网络流量曲线之间的差距,实现了对异常数据流的自动检测。实验表明,该模型不仅可以模拟与网络实测数据相似的网络流量,而且具有一定的异常流量发现能力。 This paper builds a statistics-based network traffic model by analyzing the size of network traffic and the shape of the traffic curve. It also presents an algorithm to calculate the network traffic curve under normal condition. Automatic detection of anomaly network traffic is realized by calculating the difference between the normal network traffic curve and the abnormal one. Experiments show that the simulation results are in good agreement with the real network traffic and the model can, to some extent, detect anomaly traffic.
出处 《高技术通讯》 CAS CSCD 北大核心 2007年第10期1007-1012,共6页 Chinese High Technology Letters
基金 863计划(2001AA147010B)、国家自然科学基金(60403033)资助项白.
关键词 统计 计算机网络 流量模型 异常发现 statistics, computer network, traffic model, anomaly detection
  • 相关文献

参考文献16

  • 1曾志峰,杨义先.网络安全的发展与研究[J].计算机工程与应用,2000,36(10):1-3. 被引量:65
  • 2Leland W E, Taqqu M S, Willinger W, et al. On the selfsimilar nature of Ethemet traffic. IEEE/ACM Trans on Networking, 1994, 2(1): 1,15
  • 3Jain R, Routhier S A. Packet trains-measurements and a new model for computer network traitlc. IEEE Journal on Selected Areas in Communications, 1986, 4(6): 986-995
  • 4田畅,王海,郑少仁.基于用户行为的网络流量模型及自相似性分析[J].通信学报,2000,21(9):19-25. 被引量:11
  • 5何俊峰,谢高岗,杨建华.基于周期性网络流量模型的流量预测[J].计算机应用,2003,23(10):8-11. 被引量:7
  • 6Mahoney M V. Network traffic anomaly detection based on packet bytes. In: Proceedings of the 2003 ACM Symposium on Applied Computing, NY, USA: ACM Press, 2003, 346-350
  • 7Ye N, Vilbert S, Chen Q. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Trans on Reliability, 2003, 52(1) : 75-82
  • 8Wang H N, Zhang D L, Kang G S. Detecting SYN flooding attacks. In: Proceedings of 21st Joint Conference of the IEEE Computer and Communications Societies, New York, 2002, 123-132
  • 9邹柏贤.一种网络异常实时检测方法[J].计算机学报,2003,26(8):940-947. 被引量:43
  • 10Paxson V, Floyd S. Wide-area traffic: the failure of Poisson modeling. IEEE/ACM Trans on Networking, 1995, 3 (3) : 226-244

二级参考文献22

  • 1林晓东,杨义先.一种基于TCP/IP协议的网络协议安全系统设计[J].电信科学,1996,12(12):11-14. 被引量:4
  • 2Throttan M, Ji C. Adaptive thresholding for proactive network problem detection. In: IEEE International Workshop on Systems Management, Newport, Rhode Island, 1998. 108-116.
  • 3Maxion R A. Anomaly detection for diagnosis. In: Proceedings of the 20th International Symposium Fault-Tolerant Computing(FTCS-20), 1990. 20-27.
  • 4Maxion R A, Feather F E. A case study of Ethernet anomalies in a distributed computing environment. IEEE Transactions on Reliability, 1990, 39(4): 433-443.
  • 5Lawrence Ho L, Cavuto D J, Papavassiliou S, Zawadzki A G.Adaptive and automated detection of service anomalies in trans-action-oriented WAN's: Network analysis, algorithms, implementation, and deployment. IEEE Journal of Selected Areas in Communications, 2000, 18(5): 744-757.
  • 6Hood C S, Ji C. Beyond thresholds: An alternative method for extracting information from network measures. In: Proceedings of IEEE Globecom Conference, Phoenix, Arizona, 1997.487-491.
  • 7Ward A, Glynn P, Kathy Richardson. Internet service performance failure detection. Performance Evaluation, 1998, 26(3) : 38-44.
  • 8Alarcon-Aquio V, Barria J A. Anomaly detection in communication networks using wavelet. IEE Proceeding-Communication, 2001, 148(6): 355-362.
  • 9Huang P, Feldmann A, Willinger W. A non-intrusive, wavelet-based approach to detecting network performance problems.In: Proceedings of ACM SIGCOMM Internet Measurement Workshop, San Francisco Bay Area, 2001.
  • 10Mehdi Nassehi. Anomaly detection for Markov models. IBM Research Division, Zurich Research Laboratory, Ruschlikon,Switzerland: Research Report RZ 3011 ( # 93057), 1998.

共引文献122

同被引文献4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部