期刊文献+

Approach to Anomaly Traffic Detection in a Local Network

Approach to Anomaly Traffic Detection in a Local Network
在线阅读 下载PDF
导出
摘要 The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory-based abnormal traffic detection was presented.Then an advanced ID3 algorithm was presented to classify the abnormal traffic.Finally a new model of anomaly traffic detection was built upon the two algorithms above and the detection results were integrated with firewall.The firewall limits the bandwidth based on different types of abnormal traffic.Experiments show the outstanding performance of the proposed approach in real-time property,high detection rate,and unsupervised learning. The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors. Firstly, a new algorithm in this paper named danger-theory-based abnormal traffic detection was presented. Then an advanced ID3 algorithm was presented to classify the abnormal traffic. Finally a new model of anomaly traffic detection was built upon the two algorithms above and the detection results were integrated with firewall. The firewall limits the bandwidth based on different types of abnormal traffic. Experiments show the outstanding performance of the proposed approach in real-time property, high detection rate, and unsupervised learning.
出处 《Journal of Donghua University(English Edition)》 EI CAS 2009年第6期656-661,共6页 东华大学学报(英文版)
基金 Shanghai Education Commission Foundation for Excellent Young High Education Teachers,China(No.xqz05001 No.YYY-07008)
关键词 clanger theory information enlropy ID3 algorithm abnormal traffic 流量检测 网络异常 ID3算法 异常流量 网络带宽 无监督学习 网络行为 交通异常
  • 相关文献

参考文献2

二级参考文献37

  • 1Butler D.. Computer security: Who's been looking at your data? Nature, 2002, 418:580-582
  • 2Albert R. , Jeong H. , Barabasi A. L.. Diameter of the worldwide Web. Nature, 1999, 401:130-131
  • 3Balthrop J. , Forrest S. , Newman M. E. J. , Williamson M.M.. Technological networks and the spread of computer viruses. Science, 2004, 304(5670): 527-529
  • 4Staniford S. , Paxson V. , Weaver N.. How to own the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium, San Francisco Marriott, 2002, 149-167
  • 5Morda D.. Public monitoring. In: Proceedings of the 16th FIRST Conference on Computer Security Incident Handling Response, Budapest, 2004, 81-88
  • 6Albert R. , Jeong H. , Barabasi A.L.. Attack and error tolerance of complex networks. Nature, 2002, 406:378-382
  • 7Klarreich E.. Inspired by Immunity, Nature, 2002, 415:468-470
  • 8Forrest S. , Perelson A. S.. Self-nonself discrimination in a computer. In; Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 1994, 202-213
  • 9Hofmeyr S. , Forrest S.. Architecture for an artificial immune system. Evolutionary Computation, 2000, 8(4): 443-473
  • 10Harmer P. K. , Williams P. D. , Gunsch G. H. , Lamont G. B.An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation,2002, 6(3): 252-280

共引文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部