期刊文献+

基于用户轮廓的可扩展Web流量模拟方法 被引量:2

Scalable Web traffic simulations based on user personalization
原文传递
导出
摘要 针对M IT L inco ln L ab数据集评测方法中背景超文本传输协议(hypertex t transfer protoco l,HTTP)流量在用户建模和流量模拟时会造成偏差,提出了一种基于用户轮廓的W eb流量模拟方法。该方法在应用层进行数据采集并对用户行为特征进行建模生成用户轮廓知识库,模拟时可根据不同网络环境特征扩展生成虚拟用户轮廓。实验分析表明,该方法能同时兼顾流量模拟的扩展性和真实性,生成的数据集流量特征与实际网络相吻合,用于入侵检测系统评测时能有效降低误报率指标。 Deviations in simulated HTTP traffic for intrusion detection evaluation are reduced by a scalable Web simulation method based on user personahzation which improves Web traffic simulation. The method uses user-level Web mining and automatic user-profiling. After user personalization, each user's patterns are profiled and stored in the knowledge base for simulation. Virtual user profile is introduced for Web traffic simulations of various networks. Tests illustrate the high fidelity and scalability of the simulated Web traffic, which makes the dataset more "real" and suitable for IDS evaluations. The tests also show that the dataset greatly reduces false positives.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第10期1780-1783,共4页 Journal of Tsinghua University(Science and Technology)
基金 国家"八六三"高技术项目(2001AA142020)
关键词 入侵检测 Web流量模拟 数据集评测 intrusion detection Web traffic simulation dataset evaluation
  • 相关文献

参考文献6

  • 1Lippmann R P,Haines J W,Fried D J,et al.The 1999 DARPA offline intrusion detection evaluation[J].Computer Networks,2000,34(2):579-595.
  • 2McHugh J.Testing intrusion detection systems:A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory[J].ACM Trans Information and System Security,2000,3(4):262-294.
  • 3Joshua W H,Richard P L,David J F,et al.1999 DARPA Intrusion Detection System Evaluation:Design and Procedures[R].TR1062,Massachusetts USA:MIT Lincoln Laboratory,2001.
  • 4Price R,Lang K,Pearlmutter B.Results of the Abbadingo:One DFA learning competition and a new evidence driven state merging algorithm[C]∥ Proceedings of the International Colloquium on Grammatical Inference.Iowa USA:Ames,1998.1-12.
  • 5Matthew V M,Philip K C.Learning rules for anomaly detection of hostile network traffic[C]∥ Proc 3rd IEEE Int Conf on Data Mining.Melbourne,Florida,USA,2003.601-604.
  • 6Borges J,Levene M.Data mining of user navigation patterns[C]∥ Lecture Notes in Artificial Intelligence (LNAI 1836).Berlin:Springer Verlag,2000.92-111.

同被引文献31

  • 1吴泽民,郑少仁.一种经验性的自相似流仿真算法[J].系统仿真学报,2002,14(1):41-43. 被引量:5
  • 2陈宇峰,董亚波,鲁东明,潘云鹤.面向大规模网络的聚集TCP流量模拟方法研究[J].通信学报,2006,27(2):100-106. 被引量:3
  • 3苏广文,高德远,樊晓桠,张永辉.一个基于多重随机二分法的流量仿真模型的算法设计[J].系统仿真学报,2007,19(8):1672-1676. 被引量:1
  • 4Liu Benyuan,Figueirido R Daniel,Guo Yang,et al.A study of networks simulation efficiency: Fluid simulation vs packet- level simulation[C].Proc of IEEE INFOCOM.Piscataway, NJ: Institute of Electrical and Electronics Engineers Inc, 2001: 1244-1253.
  • 5Abdelnaser Adas.Traffic models in broadband networks[J].IEEE Communications Magazine, 1997,35(7):82-89.
  • 6Walter Willinger, Murad S Taqqu, Robert Sherman, et al. Self- similarity through high-variability:Statistical analysis of ethernet LAN traffic at the source leveI[J].IEEE/ACM Transactions on Networking, 1997,5(1):71-86.
  • 7Jose C Lopez-Ardao, Candido Lopez-Garcia, Andres Suarez- Gonzalez,et al.On the use of self-similar processes in network simulation [J]. ACM Transactions on Modeling and Computer Simulation,2000,10(2): 125 - 151.
  • 8Ilkka Norros.On the use of fractional brownian motion in the theory of connectionless networks[J].IEEE Journal on Selected Areas in Communications, 1995,13(6):953 -962.
  • 9Marwan M Krunz,Armand M Makowski.Modeling video traffic using M/G/∞ input processes: a compromise between marko- vian and LRD models [J]. IEEE Journal on Selected Areas in Communications, 1998,16(5):733-748.
  • 10Wing-Cheong Lau,Ashok Erramilli,Jonathan L Wang,et al.Self- similar traffic generation:The random midpoint displacement algorithm and its properties[C].Proc of IEEE International Conference on Communications.Piscataway, NJ:Institute of Electrical and Electronics Engineers Inc, 1995:466-472.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部