期刊文献+

基于AR模型的网络异常检测 被引量:4

An AR-based Method for Detecting Network Anomaly
在线阅读 下载PDF
导出
摘要 在网络流量管理中流量异常的一般检测方法是阈值监控。文章提出一种新的异常检测方法,选取适当的SNMP管理信息库变量,建立对相关变量的局部AR(自回归)模型,检测并分析一种服务器故障引起的流量异常,获得该故障的特征向量模型;该检测方法比阈值方法有更强的检测功能,并与传统GLR测试方法进行对比。 In general,the traffic anomaly is detected using a threshold in network traffic management.In this paper,a new method was presented to dete ct traffic anomaly.By choosing the relevant variables of the SNMP management information base,modeling their observations with AR(Autoregressive)model, de-tecting and analyzing the traffic anomaly caused by a server fault,and one feature vector model of the fault was composed.This kind of method can detect some detailed anomalies those cannot be detected by threshold,and the compariso n between it and GLR test was given.
出处 《微电子学与计算机》 CSCD 北大核心 2002年第12期1-6,共6页 Microelectronics & Computer
基金 国家重大基金项目(90104006)
关键词 AR模型 网络异常检测 网络管理 网络流量 计算机网络 Traffic anomaly,Anomaly detecti on,MIB variables,Anomaly detection variable
  • 相关文献

参考文献15

  • 1Mehdi Nassehi. Anomaly detection for Markov models, Research report, 1998. IBM Research Division, Zurich Research Laboratory,8803 Ruschlikon, Switzerland.
  • 2Luca Deri, Stefano Suin and Gaia Maselli. Design and Implementation of an anomaly detection System: An empirical approach. http://jake.unipi.it/~deri/ADS.pdf. August 2001.
  • 3Patrik D'haeseleer, Stephanie Forrest and Paul Helman. A distributed approach to anomaly detection. IEEE Symposium on Security and Privacy, 1997.
  • 4Roy A Maxion and Frank E Feather. A case study of ethernet anomalies in a distributed computing environment.IEEE Transactions on Reliability, October 1990,39(4).
  • 5Marina Thottan and Chuanyi Ji. Proactive anomaly detection using distributed intelligent agents. IEEE Network, September/October 1998.
  • 6Rajesh Talpade. Gitae Kim and Sumit Khurana, Nomad:traffic-based network monitoring framework for anomaly detection. Proceedings of the fourth IEEE symposium on computers and communications(ISCC), 6-8 July, 1999, Egypt.
  • 7Lawerence Ho and Symeon Papavassiliou. Network and service anomaly detection in multi-service transaction-based electronic commerce wide area networks. Proceedings of the fifth IEEE symposium on computers & communications.
  • 8Milena Butto,Maurizio Naldi and Andrea Neri. Fuzzy logicbased diagnosis of traffic anomalies in voice networks. Journal of network and systems management, 2001,9(2).
  • 9Polly Huang,Anja Feldmann and Walter Willinger, A nonintrusive,wavelet-based approach to detecting network performance problems. November 2 2001,ACM SIGCOMM Internet measurement workshop 2001, San Francisco, USA.
  • 10V Alarcon-Aquino and J A Barria. Anomaly detection in communication networks using wavelets. IEE Proc.-Commun., December 2001,148(6).

同被引文献27

  • 1俞承志,王淑静,宋瀚涛.基于MIB-Ⅱ的网络安全入侵检测策略[J].北京理工大学学报,2004,24(8):696-700. 被引量:4
  • 2曹铮.互联网异常流量的Netflow分析[J].中国数据通信,2004,6(8):77-82. 被引量:4
  • 3Douglas E.Comer David L.Stevens.用TCP/IP进行网际互联第二卷:设计、实现与内核.第3版,电子工业出版社,2001.
  • 4RFC1213:Management Information Base for Network Management of TCP/IP-based Internets MIB-II[S] .1999.
  • 5FUSCO F, HUICI F, DERI L, et aL Enabling high-speed and ex- tensible real-time communications monitoring[ C]//IM'09: Proceed- ings of the 1 hh IFIP/IEEE International Conference on Symposium on Integrated Network Management. Piscataway: IEEE Press, 2009:343-350.
  • 6DERI L, SUIN S, MASELLI G. Design and implementation of an a- nomaly detection system: an empirical approach[ C]// Proceedings of Terena TNC 2003. Zagreb, Croatia: [ s. n. ], 2003: 2001.
  • 7郎永祥 朱广福 董勇.一种新的网络异常监测模型.电脑知识与技术,2008,(24):1058-1060.
  • 8HANJia-wei KamberMicheline 范明.数据挖掘:概念与技术[M].北京:机械工业出版社,2001..
  • 9JrisitianiniN Shawe-TaylorJ 李国正 王猛 曾华军译.支持向量机导论[M].北京:电子工业出版社,2004.53-79.
  • 10Jon Postel.RFC 793[A].DARPA.Transmission Control Protocol-DARPA Internet Program Protocol Specification[C].Cacifornia:Information Sciences Institute,1981.7-52.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部