期刊文献+

基于分形特征的网络异常检测方法研究 被引量:2

A Novel Approach Based on Fractal Characteristics for Anomaly De tection
下载PDF
导出
摘要 网络连接同许多其它现象一样,呈现出一种统计自相似性。论文根据此特征提出了一种基于分形特征的网络异常检测方法,该方法能够根据网络连接分形维数的变化,有效地检测网络拒绝服务攻击和端口扫描等异常情况,并通过模拟实验证明了该方法的可行性。 Just as many other phenomena,network connection takes on a kind of characteristic of statistical self-simi-larity.Based on this intrinsic factor,a new anomaly detection approach using fractal theory is proposed in this paper.The method can efficiently detect port scan and network DoS attacks according to the change of network connection's fractal dimension.Simulated tests given in the paper have proved its feasibility and applicability.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第22期34-36,共3页 Computer Engineering and Applications
基金 国家863高技术研究发展计划支持项目(编号:2002AA4Z3420)
关键词 网络安全 分形 自相似 network security,fractal,self-similarity
  • 相关文献

参考文献5

  • 1Andersen D,Lunt T F,Javitz H S et al.Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system(NIDES)[R].Technical Report SRI-CSL-95-06,SRI Computer Science Laboratory ,1995-05
  • 2陈硕,安常青,李学农.分布式入侵检测系统及其认知能力[J].软件学报,2001,12(2):225-232. 被引量:44
  • 3Jake Ryan,Meng-Jang Lin.Intrusion Detection with Neural Networks.Advances in Neural Information Processing System 10,Cambridge
  • 4苏璞睿 李德全 冯登国.基于基因规划的主机异常入侵检测模型[M].,2003-06.1120-1126.
  • 5Carl Nuzman,Iraj Saniee,Wim Sweldens et al.A compound model for TCP connection arrivals for LAN and WAN applications[J].Computer Networks ,2002; 40: 319~337

二级参考文献1

共引文献43

同被引文献15

  • 1MALLAT S.A theory for multiresolution signal decomposition:the wavelet representation[J].IEEE Trans.Pat.Anal.Mach.Intell.,1989,11 (7):674-693.
  • 2FROMM U,MORSHUIS P H F.Partial discharge classification at DC voltage[A].Proceedings of IEEE Conference on Conduction and Breakdown,Solid Dielectics[C].1995,4:403-407.
  • 3Huang Y,Pullen J M.Countering denial of service attacks using congestion triggered packet sampfing and filtering[C].Proc.of the 10th International Conference on Computer Communiations and Networks,2001
  • 4Feinstein L,Schnackenberg D,Balupari R,et al.Statistical approaches to DDoS attack detection and response[C].Proc.of the DARPA Information Survivability Conference and Exposition,2003
  • 5Barford P,Kline J,Plonka D,et al.A signal analysis of network traffic anomalies[C].Proc.of ACM SICCOMM TMW 2002:1-12
  • 6Raymond C Garela.WMD:wavelet analysis intrusion detection[C].Prec.of IEEE Midwest Symposium on Circuits and Systems,2002,3:688-691
  • 7陈颐,陈凌.分形几何学[M].北京:地震出版社,2005
  • 8MIT Lincoln labs,LL DDoS1.0 intrusion detection data set[EB/OL].http://www.ll.mit.edu/IST/ideval/data/2000/LLS_DDOS_1.0.html,2005
  • 9MIT Lincoln labs.1999 DARPA intrusion detection evaluation data set[EB/OL].http://www.LI mit.edu/IST/ideval/data/1999/1999_data_index.html,2005
  • 10蔡旭.直流系统接地故障检测新原理及装置[J].华北电力大学学报(自然科学版),1998,25(1):96-100. 被引量:12

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部