期刊文献+

基于告警相关概率的负载均衡方法

Methodology of the load balancing based on alert correlated probability
在线阅读 下载PDF
导出
摘要 针对在负载均衡中相关告警分配到不同处理节点上的问题,提出一种基于告警相关概率的负载均衡方法。实验结果表明,该方法适合于传输信息关联的场合,具有负载均匀度较高、告警关联平均破坏度低等优点。 Considering the question that correlated alert is distributed among the different processing node, a methodology of the load balancing based on alert correlated probability is proposed in this paper.All the results show that this methodology is suitable for transmission of information associated with the occasion.Moreover, it 's good load balancing metric and low alert correlation average disruption.
出处 《微计算机信息》 2010年第9期95-97,共3页 Control & Automation
基金 基金申请人:秦拯 项目名称:面向高速网络入侵检测的基于P2P的分流技术研究 基金颁发部门:广东省自然科学基金委(7007730)
关键词 负载均衡 告警相关 相关概率 Load balancing Alert correlation Correlated probability
  • 相关文献

参考文献12

  • 1凌永发,王杰,陈跃斌.计算机入侵检测技术应用研究[J].微计算机信息,2006,22(03X):53-55. 被引量:18
  • 2Der-Chiang Li,Chihsen Wu,Fengming M. Chang. Determination of detecting intervals in dynamic weighted Round-Robin method for networks load balancing [J]. Comput. Oper. Res, 2005,32 (8): 2129 - 2145.
  • 3陈一骄,卢锡城,时向泉,孙志刚.一种面向会话的自适应负载均衡算法[J].软件学报,2008,19(7):1828-1836. 被引量:24
  • 4Tarek Abbes, Alakesh Haloi, Micha?l Rusinowitch. High Performance Intrusion Detection using Traffic Classification[J]. Proceedings of the IEEE International Conference on Advances in Intelligent Systems (AISTA2004), Luxembourg , Nov 2004:15-18.
  • 5L Schaelicke, K Wheeler, C Freeland. A Scalable Network Intrusion Detection Loadbalancer [J]. Proceedings of the 2rid Conference on Computing Frontiers, 2005:124-132.
  • 6JIANG Wenbao, HAO Shuang, DAI Yiqi, LIU Tinghua. Load Balancing Algorithm for High-speed Network ISntrusion Detection Systems[J]. Journal of Tsinghua Univ (Sci&Tech), 2006, 46(1):106-110.
  • 7Yu R, Sun Z, Chen J, Mei SL, Dai YQ. Traffic distributor for high-speed network intrusion detection system [J]. Journal of Tsinghua University (Sci. & Tech.), 2005,145(10):1377-1380.
  • 8Shi WG, MacGregor MH, Gburzynski P. Load balancing for parallel forwarding [J]. IEEE/ACM Trans. on Networking, 2005,13(4): 790-801.
  • 9A Valdes,K Skinner.Probabilistic alert correlation[J].The 4th Int' 1 Syrup on Recent Advances in Intrusion Detection (RAID 2001), Davis, CA, 2001: 54-68.
  • 10Ning P.Cui Y.An intrusion alert correlator based on prerequisites of intrusions[R].North Carolina State University,2002:146-163.

二级参考文献15

  • 1陈训逊,方滨兴,李蕾.高速网络环境下入侵检测系统结构研究[J].计算机研究与发展,2004,41(9):1481-1487. 被引量:10
  • 2程光,龚俭,丁伟,徐加羚.面向IP流测量的哈希算法研究[J].软件学报,2005,16(5):652-658. 被引量:54
  • 3连洁,王杰.入侵检测系统在涉密计算机中的应用研究[J].微计算机信息,2005,21(10X):24-26. 被引量:8
  • 4IP Flow information export (ipfix). 2004. http://www.ietf. org/html.charters/ipfix-charter.html
  • 5Thompson K, Miller G, Wilder R. Wide area Internet traffic patterns and characteristics. IEEE Network, 1997,11(6):10-23.
  • 6Cisco Netflow. 2004. http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml
  • 7Jain R. A comparison of hashing schemes for address lookup in computer networks. IEEE Trans. on Communications, 1992,40(3):1570-1573.
  • 8Cao Z, Wang Z, Zegura E. Performance of hashing-based schemes for Internet load balancing. In: Nokia FB, ed. Proc. of the IEEE INFOCOM 2000. Piscataway: IEEE Computer and Communications Societies, 2000. 332-341.
  • 9Duffield NG, Grossglauser M. Trajectory sampling for direct traffic observation. IEEE/ACM Trans. on Networking, 2001,9(3):280-292.
  • 10NLANR network traffic packet header traces. 2004. http://pma.nlanr.net/Traces/

共引文献90

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部