期刊文献+

基于信息熵的大规模网络流量异常分类 被引量:6

Entropy-Based Classification of Large-Scale Network Traffic Anomalies
在线阅读 下载PDF
导出
摘要 本文提出了基于信息熵的大规模网络流量异常分类方法。该方法综合运用子空间方法和k-means分类方法,并以校园网为实验环境实现了网络流量异常分类实验。实验结果表明,基于信息熵的大规模网络流量异常分类实现简单、计算量小,分类准确性高。 This paper presents an entropy-based large-scale network traffic anomaly classification method for the integrated use of the subspace method and the k-means clustering method.And classifying network traffic anomalies is realized in the experimental environment of campus networks.The experimental results show that large-scale traffic anomaly classification based on entropy not only realizes simple and has a small computation quantity,but also has a high classification precision.
出处 《计算机工程与科学》 CSCD 2007年第2期40-43,共4页 Computer Engineering & Science
关键词 信息熵 子空间方法 大规模网络流量 异常分类 entropy,subspace method,large-scale network traffic,anomaly classification
  • 相关文献

参考文献7

  • 1Lakhina A,Crovella M,Diot C.Diagnosing Network-Wide Traffic Anomalies[A].ACM SIGCOMM[C].2004.
  • 2Lakhina A,Crovella M,Diot C Mining Anomalies Using Traffic Feature Distributions[A].ACM SIGCOMM[C].2005.
  • 3Lakhina A,Crovella M,Diot C.Haracterization of Network-Wide Anomalies in Traffic Flows[R].Technical Report BUCS-2004-020,Boston University,2004.
  • 4余艳.基于信息熵的粗糙集在故障诊断中的应用研究:[硕士学位论文][D].长沙:湖南大学,2004.
  • 5Smith L I.A Tutorial on Principal Components Analysis[EB/OL].Http://csnet.Otago.Ac.Nz/cosc453/student_tutorials/Principal.Componets.Pdf,2002-02.
  • 6向继,高能,荆继武.聚类算法在网络入侵检测中的应用[J].计算机工程,2003,29(16):48-49. 被引量:41
  • 7陈华,陈书海,张平,严卫东.K-means算法在遥感分类中的应用[J].红外与激光工程,2000,29(2):26-30. 被引量:26

二级参考文献8

  • 1Han Jiawei Kamber M.数据挖掘-概念与技术[M].高等教育出版社,2002..
  • 2HanJiawei KamberM.数据挖掘—概念与技术[M].高等教育出版社,2002..
  • 3Portnoy L, Eskin E,Stolfo S J.Intrusion Detection with Unlabeled Data Using Clustering. Philadelphia, PA:ln Proceedings of ACM CSS Workshop on Data Mining Applied to Security(DMSA,2001 ),2001.
  • 4Eskin E,Amold A,Prerau M A Geometric Framework for Unsupervied Anomaly Detection: Detecting Intrusions in Unlabeled Dala.CUCS Technical Report,2002.
  • 5Application of Data Mining to Intrusion Detection.http://www.isse.gmu.ed u/-csis/infs765/handouts/handout 12.pdf,2000.
  • 6Barbara D.ADAM:Detecting Intrusions by Data Mining.Proceedings of IEEE Workshop on Information Assurance and Security,2001.
  • 7Kdd99 Cup dataset.http://kdd.ics:uci.edu/databases/kddcup99/kddcup99.html, 1999.
  • 8王玉珠,萧惠来.FDA对防滥用阿片类药物研究的要求[J].现代药物与临床,2014,29(11):1311-1317. 被引量:12

共引文献65

同被引文献54

引证文献6

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部