期刊文献+

采用回归方法优化网络流量管理模型处理性能 被引量:8

Optimizing process performance of network traffic management model using regression analysis
下载PDF
导出
摘要 为探索优化网络流量管理性能的有效途径,在分析"深度报文检测和深度流行为检测"网络流量管理模型结构的基础上,确定了影响网络流量管理效率的性能指标及其计算方法,通过实际抽样流量数据计算性能指标值,建立性能指标关系散点图,发现性能指标间呈线性特征,采用多元回归方法建立性能指标估计函数,并利用标准化残差估计方法验证了函数的可用性和适应性,从而得到优化网络流量管理性能的定量计算方法。 For seeking the valuable method to optimize the performance of network traffic management, the performance indexes and calculation method are ascertained on the basis of analyzing the structure of the network traffic management model which composes of the deep packet inspection and the deep flow inspection. Through sampling traffic data to calculate performance indexes, the scatter plot of performance indexes is build up and the linear character is observed among indexes. Furthermore, the evaluated function is set up by using the multivariate regression method and validated by the standard residual function to prove the usability and adaptability. As a result, the quantum calculation method is acquired for optimizing the performance of network traffic management.
作者 邬平 吴斌
出处 《计算机工程与应用》 CSCD 2012年第4期104-106,110,共4页 Computer Engineering and Applications
关键词 多元回归方法 网络流量管理模型 深度报文检测 深度流行为检测 线性回归函数 multivariate regression method network traffic management model deep packet inspection deep flow inspection linear regression function
  • 相关文献

参考文献12

  • 1Femandes S,Antonello R, Lacerda T, et al.Slimming down deep packet inspection systems[C]//IEEE NFOCOM Workshops,2009: 1-6.
  • 2Xia Tianming, Song Ruiqi.A method of P2P traffic identifica- tion on Intemet based on the deep flow inspection[C]//Intema- tional Conference on Communication Software and Networks, 2009.
  • 3Bob S.The trouble with "deep packet inspection"[EB/OL].[2008]. http://redtape.msnbc.com/2008/10/deep-down-most.html.
  • 4王珊,陈松,周明天.网络流量分析系统的设计与实现[J].计算机工程与应用,2009,45(10):86-88. 被引量:13
  • 5Stevens W R.TCP/IP illustrated volume l:the protocols[M].[S.1.]: Addison Wesley,2000:170-173.
  • 6Stevens W R.TCP/IP illustrated volume 3:TCP for transactions,HTTP, NNTP, and the UNIX domain protocols[M].[S.l.]: Addi- son Wesley,2000:280-284.
  • 7Draper N R, Smith H.Applied regression analysis[M].3rd ed.[S.l.]: Wiley-Interscience, 1998.
  • 8Doebelin E O.Measurement systems: application and design[M]. [S.I.] : MgGraw-Hill Companies, 2007 : 86-88.
  • 9蔡光兴.线性代数[M].北京:科学出版社,2003:66-68.
  • 10Backhaus K,Erichson B,Plinke W.Multivariate statistical analy- sis[M].Shanghai:Shanghai People's Publishing I-Iouse,2008:48-49.

二级参考文献16

  • 1Chan Y T,Shoniregun C,Akmayeva G.A NetFlow based intemetworm detecting system in large network[C]//Proceedings of Third International Conference on Digital Information Management,2008 (ICDIM 2008).London:IEEE Press,2008:581-586.
  • 2Androulidakis G,Papavassiliou S.Improving network anomaly detection via selective flow-based sampling[J].IET Communications,2008, 2: 399-409.
  • 3Kumar A,Xu J.Sketch guided sampling-using on-line estimates of flow size for adaptive data collection[C]//Proceedings of 25th IEEE International Conference on Computer Communications 2006(INFOCOM 2006 ).Barcelona: IEEE Press, 2006:1-11.
  • 4Keys K,Moore D,Estan C.A robust system for accurate real-time summaries of internet traffic[C]//Proceedings of the 2005 ACM SIGMETRICS International Conference.New York:ACM,2005:85-96.
  • 5Estan C,Keys K,Moore D,et al.Building a better netflow[J].ACM SIGCOMM Computer Communication Review,2004,34(4):245-256.
  • 6B Hari,S Suri,G Parulkar.Detecting and Resolving Packet Filter Conflicts[C].In:Proceedings of IEEE INFOCOM'00,2000
  • 7A Mayer,A Wool,E Ziskind.Fang:A Firewall Analysis Engine[C].In:Proceedings of the 2000 IEEE Symposium on Security and Privacy,2000
  • 8Y Permpoontanalarp,C Rujimethabhas.A Unified Methodology for Verification and Synthesis of Firewall Configurations[C].In:ICICS 2001,LNCS 2229,Springer-Verlag Berlin Heidelberg,2001:328~339
  • 9J D Guttman.Filtering Postures:Local Enforcement for Global Policies[C].In:Proc IEEE Symp on Security and Privacy,Oakland,CA,1997
  • 10R Panko.Corporate Computer and Network Security[M].Prentice Hall,2003

共引文献38

同被引文献75

引证文献8

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部