期刊文献+

用于网络流量异常检测的数据采集方法的研究 被引量:1

Comparative Studies on two Methods of Data Collection Technology in Network Traffic Anomaly Detection
下载PDF
导出
摘要 网络带给人们自由开放的同时,也带来不可忽视的安全风险,网络安全越来越成为人们关注的重点。作为网络安全研究领域中重要组成部分的网络流量异常检测技术研究也逐渐得到重视。在网络流量异常检测技术的研究中首先要进行网络流量的采集,然后对所采集的流量进行分析。网络流量的采集主要有两种比较流行的方法:一是基于包的采集方法,另一种是基于流的采集方法。在此主要将这两种数据采集方法进行对比研究,并得出了实验的结果。 Internet is free and open to people, and at the same time security risks can not be ignored. Network and information security has increasingly become the focus of our attention. As the important part of network security, network traffic anomaly detection technology gradually has been studied more and more. This paper mainly focus on two comparative studies on two methods of network traffic collection (one is packet-based data collection method, another is flow-based data collection method), and gives the simulation results.
作者 陈明兵 刘知贵 CHEN Ming-bing, LIU Zhi-gui (College of Computer Science and Technology, South West University of the Science and Technology, Mianyang 621010, China)
出处 《电脑知识与技术》 2009年第2期822-824,共3页 Computer Knowledge and Technology
关键词 网络流量异常检测 基于包的数据采集方法 基于流的数据采集方法 网络安全 对比研究 network anomaly detection packet-based data collection method flow-based data collection method network security comparative studies
  • 相关文献

参考文献4

二级参考文献16

  • 1陈述彭 鲁学军 等.地理信息系统导论[M].北京:科学出版社0,2000..
  • 2Criscuolo P J. Distributed denial of service-trin00, tribe flood network [R]. Technical Report CIAC2319. Washington DC: Department of Energy, 2000.
  • 3Cabrera J B D, Lewis L, Qin Xinzhou, et al. Proactive detection of distributed denial of service attacks using MIB traffic variables: a feasibility study [A]. Proceedings of 2001 International Symposium on Integrated Network Management [C]. Piscataway, US
  • 4Kulkarni A B, Bush S F, Evans S C. Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics[R]. Technical Report 1CRD176. New York: Research and Development Center, General Electric Company, 2001.
  • 5Cohen L. Time-frequency analysis [M]. Englewood Cliffs, USA: Prentice Hall, 1995.
  • 6MIT Lincoln Laboratory. 2000 DARPA intrusion detection scenario specific data sets [EB/OL]. http://www.ll.mit.edu/IST/, 2003-10-21.
  • 7Ronald G R.业务规则方法原理[M].北京:机械工业出版社,2004:8-29.
  • 8Ronald G R.The Business Rule Approach[J].Computer,2003,36(5):85.
  • 9Jeng J J,David F,Shubir K.RuleBAM:A Rule-based Framework for Business Activity Management[C].Proceedings of IEEE International Conference on Services Computing,2004:262.
  • 10Halpin T.Verbalizing Business Rules[Z].http://www.brcommunity.com.

共引文献12

同被引文献3

  • 1夏正敏.基于分形的网络流量分析及异常检测技术研究[J].上海交通大学.2012.
  • 2杨强,谷利泽.基于模糊综合评判的入侵检测告警处置模型[A].2009通信理论与技术新发展--第十四届全国青年通信学术会议论文集[c].2009.
  • 3任志良,邓志东,帅典勋,孙增圻.计算机网络模型中的复杂性现象分析[J].清华大学学报(自然科学版),2002,42(1):64-67. 被引量:2

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部