期刊文献+

非自体入侵下网络HTTP协议报文取证分析

Analysis of Network HTTP Protocol Message Forensics under Non-autologous Intrusion
在线阅读 下载PDF
导出
摘要 为了实现非自体入侵下网络安全性,需要进行入侵HTTP协议报文取证分析,实现入侵信息检测,提出一种基于随机码持续性扩频检测的非自体入侵下网络HTTP协议报文取证方法.构建非自体入侵下网络HTTP协议报文随机序列分布模型,采用码元包络幅值特征提取方法进行网络HTTP协议报文的非自体入侵下信息特征提取,结合相关性频谱分析方法实现入侵数据的模糊聚类处理,提取非自体入侵特征的关联规则分布集,根据提取结果采用随机码持续性扩频检测方法实现非自体入侵下网络HTTP协议报文取证,提高网络安全性.仿真结果表明,采用该方法进行非自体入侵下网络HTTP协议报文取证的准确性较高,抗干扰性较好. It is necessary to analyze the intrusion HTTP protocol message and realize the intrusion information detection in order to realize the network security under non-autologous intrusion.A new network HTTP protocol message method based on random code continuous spread spectrum detection is proposed.The random sequence distribution model of network HTTP protocol message under non-autologous intrusion was constructed,and the feature extraction method of coded envelope amplitude was used to extract the information feature of network HTTP protocol message under nonautointrusion.Based on the correlation spectrum analysis method,the fuzzy clustering processing of intrusion data was realized,and the association rule distribution set of non-autologous intrusion features was extracted.According to the extracting,the random code continuous spread spectrum detection method was used to realize the network HTTP protocol message collection under non-autologous intrusion,which can improve the security of the network.The simulation results show that the proposed method is more accurate and anti-jamming in network HTTP protocol message under nonautologous intrusion.
作者 李枫 LI Feng(Shanxi Police College,Taiyuan 030006,China)
机构地区 山西警察学院
出处 《内蒙古民族大学学报(自然科学版)》 2019年第6期479-484,共6页 Journal of Inner Mongolia Minzu University:Natural Sciences
基金 山西省“1331工程”重点学科建设计划经费资助(1331KSC) 山西警察学院科研创新团队建设计划资助
关键词 非自体入侵 网络 HTTP协议 报文 取证 Non-autologous intrusion Network HTTP protocol Message Forensics
  • 相关文献

参考文献9

二级参考文献63

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:237
  • 2崔慧,潘巨龙,闫丹丹.无线传感器网络中基于信誉-投票机制的恶意节点检测[J].中国计量学院学报,2013,24(4):353-359. 被引量:7
  • 3毕小龙,王洪跃,司风琪,徐治皋.基于趋势提取的稳态检测方法[J].动力工程,2006,26(4):503-506. 被引量:17
  • 4He Hai-bo ,Edwardo A Garcia. Learning from imbalanced data[ J]. IEEE Transactions on Knowledge and Data Engineering, 2009,21 (9) :1263-1284.
  • 5Yao Pei, Wang Zhong-sheng, Jiang Hong-kai, et al. Fault diagnosis method based on cs-boosting for unbalanced training data[ J ]. Journal of Vibration, Measurement & Diagnosis,2013,33 ( 1 ) : 111-115.
  • 6Powers David Martin. Evaluation: from precision, recall and Fmeasure to ROC, informedness, markedness and correlation [ J ]. Journal of Machine Learning Technologies ,2011,2 ( 1 ) :37-63.
  • 7Shao Kuoyi, Zhai Yun, Sui Hai-feng et al. A new over-sample method based on distribution density [ J ]. Journal of Computers, 2014,9(2) :483-490.
  • 8Nitesh V Chawla, Kevin W Bowyer, Lawrence O Hall, et al. Smote: synthetic minority over-sampling technique [J]. Journal of Artificial Intelligence Research,2002,16( 1 ) :321-357.
  • 9Claudia Galarda Varassin, Alexandre Plastino, Helena Cristina Da Gama Leitao, et al. Undersampling strategy based on clustering to improve the performance of splice site classification in human genes in database and expert systems applications[ C]. 24th IEEE Interna- tional Workshop on DEXA,2013:85-89.
  • 10Mahesh V Joshi, Ramesh C Agarwal,Vipin Kumar. Mining needles in a haystack:classifying rare classes via two-phase rule induction [ C ]. Proceedings of the ACM SIGMOD International Conference on Management of Data,2001:91-102.

共引文献152

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部