期刊文献+

基于信息熵的网络异常流量的研究 被引量:2

在线阅读 下载PDF
导出
摘要 详细介绍了信息、信息量和信息熵的含义,并结合网络异常流量的特点,通过信息熵反应网络的流量情况。介绍了异常流量的特点和目前主要检测技术,然后介绍基于信息熵的网络异常流量检测技术,最后通过数学公式的推导,分析了利用信息熵计算分布式入侵检测的原理。
出处 《广东通信技术》 2008年第4期32-34,46,共4页 Guangdong Communication Technology
  • 相关文献

参考文献8

  • 1A .Ciemm,G LinR ethinkingm anageabiiity-advancesa nde mergingp aradigm shins in managing intelligent IP networks Network Operations and Management Symposium,2004.N OMS2 004.1E EE/IFIP, V olume:1,19-23April20 04P ages:930 Vol
  • 2J. Chen. R. Hudson. and K. Yao. Maximum-likelihood source localization and unknown sensor location estimation for wideband signals in the near-field. IEEE T Signal Proces., 50(8):1843-1854, August 2002
  • 3Feinstein, L., Schnackenberg, D.:Statistical Approaches to Information Survivability Conference and Exposition (DISCEX 2003), pp. 303-314 (2003)
  • 4C.E. Shannon, The mathematical theory of communication, The BellSystem Technical Journal 27 (1948) 623-656, pp. 623-656
  • 5A. Lakhina, M. Crovella, and C. Diot. Diagnosing network-wide traffic anomalies. In SIGCOMM, pages 219-230, 2004
  • 6Feinstein L, Schnackenberg D, Balupari R, et al Statistical Approaches to DDoS Attack Detection and Response[C]//Proc. of the DARPA Information Survivability Conf. and Exposition. 2003
  • 7Limwiwatkul, L., Rungsawangr, A.: Distributed Denia of Service Detection using TCP/IP Header and Traffic Measurement Analysis. In: 2004 International Symposium on Communications and Information Technologies (ISCIT 2004), Sapporo, Japan (2004)
  • 8Moore D, Voeker G M, Savage S. Inferring Internet Denial-of-Service Activity[C]//Proceedings of USENIX Security Symposium. 2001

同被引文献11

  • 1李更生.基于时间序列分析的Web服务器DDoS攻击检测[J].计算机工程与应用,2007,43(7):135-138. 被引量:4
  • 2王海龙,杨岳湘.基于信息熵的大规模网络流量异常检测[J].计算机工程,2007,33(18):130-133. 被引量:13
  • 3Lakhina A, Crovella M, Diot C. Characterization of Network- wide Anomalies in Traffic Flows[R]. Technical Report: BUCS- 20040020. Boston University, 2004.
  • 4Kargupta H,Park B, Hershberger D, et al. Collective data min- ing: a new perspective toward distributed data mining[C]//Pro- ceedings of Advances in Distributed and Parallel Knowledge Dis- covery. [S. 1. ] ; AAAAI/MIT Press, 2000 : 128-175.
  • 5Sommer R, Paxson V. Outside the closed world; On using ma- chine learing for network intrusion detection[C]//Proc, of 2010 IEEE Symposium on Secutiry and Privacy. 2010:302-355.
  • 6Nehinbe J O. Automated technique for debugging network intru- sion detection systems[C]//IEEE 2010 International Confe- rence on Intelligent Systems, Modelling and Simulation (ISMS). Liverpool, 2010 : 363-367.
  • 7Kim D S, Nguyen H N,Park J S. Genetic algorithm to improve SVM based network intrusion detection system[C]//Proc, of the 19th International Conference on Advanced Information Networking and Applications. 2005: 150- 164.
  • 8彭涛,薛小平,梅素平,温德龙.基于实时方差时间图法的DDoS攻击检测[J].计算机应用,2009,29(B06):80-82. 被引量:2
  • 9李文忠,左万利,赫枫龄.一种基于信息熵的多维流数据噪声检测算法[J].计算机科学,2012,39(2):191-194. 被引量:4
  • 10丁世飞,朱红,许新征,史忠植.基于熵的模糊信息测度研究[J].计算机学报,2012,35(4):796-801. 被引量:19

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部