期刊文献+

基于统计方法的骨干网异常流量建模与预警方法研究 被引量:3

The Backbone Network Traffic Modeling and Anomalous Forecasting Approach Research Based on Statistic Method
下载PDF
导出
摘要 近几年来,Internet 上频繁发生的蠕虫爆发和大规模分布式拒绝服务事件使网络服务的安全性面临严重的威胁。本文介绍了一个基于异常流量检测的 Internet 骨干网流量早期预警系统 ESTAB(Early-warning System ofTraffic Anomaly Based)。它基于 Internet 骨干网异常流量发现原理,通过对端口、长度分布、TCP 标志等直接变量(Direct Variable)的监测,并结合统计学中的时间序列分析方法,实时分析发现流量异常,并提出告警。文中提出了多种事件联合监测的概念,从流量监测角度有效地对付已知流量威胁(如已知蠕虫),并对未知流量威胁提供了相应的监测策略。 Worm and Dos, DDos attacks take frequently place more and more nowadays. It makes the internet security facing serious threat. This paper introduced the algorithm and design of ESTABD, an internet backbone Early Bird System of Traffic Anomaly Detection Based. ESTABD analyzes real-time traffic to discover the abrupt traffic anomalous and generate warnings. A traffic anomaly detection algorithm based on Statistic Prediction theory is put forward and the algorithm has been tested on real network data. Further more, Alerts correlation algorithm and system policy are addressed in this paper to detect the known worms& DOs attacks and potentially unknown threats.
出处 《计算机科学》 CSCD 北大核心 2006年第2期92-96,共5页 Computer Science
基金 国家自然科学基金项目(90204008)。
关键词 流量异常检测 Internet骨干网 时间序列分析 预测 预警 滑动时间窗 Traffic anomaly detection, Internet backbone, Forecasting, Time serial analysis, Early warning, Slip window
  • 相关文献

参考文献11

  • 1Moore D,Shannon,et al.Code-Red:a case study on the spread and victims of an Internet worm.IMW,2002
  • 2Moore D,Paxson V,et al.The Spread of the Sapphire/Slammer Worm.CAIDA,ICSI,Silicon Defense,UC Berkeley EECS and UC San Diego CSE,2003
  • 3Weaver N,Paxson V,Staniford S,et al.A Taxonomy of Computer Worms.In:Proc.ACM CCS Workshop on Rapid Malcode,2003
  • 4http://www.cnn.com/2001/TECH/internet/10/31/new.nimda.idg/
  • 5http://www.cnn.com/2003/TECH/internet/01/25/internet.attack/
  • 6Security firm:MyDoom worm fastest yet.http://edition.cnn.com/2004/TECH/internet/01/28/mydoom.spreadwed/index.html
  • 7Barford P,Kline J,Plonka D,et al.A signal analysis of network traffic anomalies.In:Internet Measurement Workshop,2002
  • 8Madhusudan B,Lockwood J,et al.Design of a System for RealTime Worm Detection.In:12th Annual IEEE Symposium on High Performance Interconnects (Hot-I),Stanford,CA,2004.77~83
  • 9Lakhina A,Papagiannaki K,Crovella M,et al.Structural analysis of network traffic flows.Proc ACM SIGMETRICS,2004
  • 10http://www.itl.nist.gov/div898/handbook/pmc/section4/pmc42.html

同被引文献12

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部