期刊文献+

自适应参数的网络异常流量检测方法

Anomaly Network Traffic Detection Based on Auto-Adapted Parameters Method
下载PDF
导出
摘要 分布式拒绝服务(DDoS)攻击对互联网的稳定性和安全性构成了严重的威胁.对网络流量进行异常检测,发现异常后再对数据包进行分析,实施相应措施,有利于降低系统开销.该文给出了网络流量均值和阈值能够根据网络环境变化的自适应调整算法.分析了参数的设置对误报警、动态调整报警阈值等的影响.实验结果表明设计的系统是有效和正确的,可以在提高异常流量检测准确性的同时降低运行开销,可以直接应用于检测SYN洪水攻击等. Distributed Denial of Service(DDoS) attack presents a very serious threat to the stability and security of the Internet. It should be more efficient to detect the anomaly of network traffic firstly rather than to analyze the data packets directly. In this paper, an algorithm is proposed for the number of network traffic and alarm threshold will be adjusted to adapt the changing of network environment. The influence on setting parameters of the failing alarm and the dynamic adjusting of alarm threshold, etc, is investigated then. The experiment shows that the algorithm is effective and correct, which can improve the accuracy of anomaly traffic detection and reduce the operation cost. So it can be directly applied in detecting SYN flooding attacks and so on.
出处 《北京交通大学学报》 CAS CSCD 北大核心 2008年第6期73-77,共5页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 国家自然科学基金资助项目(60573141 60773041)
关键词 流量检测 CUSUM算法 EWMA算法 报警闽值 traffic detection cumulative sum(CUSUM) algorithm exponential weighted moving aver-age(EWMA) algorithm alarm threshold
  • 相关文献

参考文献7

  • 1Siris V A, Papagalou F. Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks [ C] // Proc. of the Conf. on Global Telecommunications, 2004: 1882- 1886.
  • 2Wang H,Zhang D, Shin K G. Detecting SYN Flooding Attacks[C]//. Proceedings of the Annual Joint Conference of the IEEE Computer Society and Communications Society (INFO2COM), New York: NY, USA,2002,3:1530- 1539.
  • 3Wei Chen, Dit Yan Yeung. Throttling Spoofed SYN Flooding Traffic at the Source[J]. Telecommunication Systems, 2006,33:47 - 65.
  • 4孙知信,唐益慰,程媛.基于改进CUSUM算法的路由器异常流量检测[J].软件学报,2005,16(12):2117-2123. 被引量:27
  • 5Feinstein L, Schnackenberg D, Balupari R, et al. Statistical Approaches to DDoS Attack Detection and Response[ C] //. Proc. of the DARPA Information Survivability Conf. and Exposition, 2003: 303- 314.
  • 6Page E S. Continuous Inspection Schemes[J]. Biometrika, 1954,41 : 100 - 115.
  • 7Gan F F. An Optimal Design of CUSUM Quality Control Charts[ J ]. Journal of Quality Technology, 1991,23 (4) : 273 - 286.

二级参考文献2

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部