期刊文献+

基于数据挖掘的CDMA2000移动网络防盗用技术 被引量:1

CDMA2000 Mobile Network Security Based on Data Mining Technology
下载PDF
导出
摘要 针对CDMA2000EVDO移动网络中的盗用问题,结合CDMA网络无线宽带原始计费话单的生成机制,对AAA的原始计费话单内容进行了分析和解构;基于数据挖掘理论和技术提出了原始计费话单分析模型,从中发现话单与盗用行为的关联性,并通过编写分析脚本,实现了可疑话单的筛选。最后,利用广东电信现网数据进行分析,对系统模型进行了验证。测试结果显示,原始计费话单分析模型能够完成原始计费话单的分析工作,并从中找出异常的话单。 Aiming at the theft problem of CDMA2000 EVDO mobile network, and combining with the generating mechanism of the call detail record in CDMA wireless broadband network in China, the content of AAA (Au- thentication, Authorization, Accounting) call detail record is analysed and deeonstructed, an original billing com- munication detail records analysis model based on data mining technology is put forward to search the connection between the call detail record and the theft behavior. The screening of suspicious records is realized finally by writing analysis scripts. Meanwhile,the validity of the system model is validated by analysing the real data from Guangdong Telecom. Test results show that the analysis model is able to complete the analysis of the original billing communication detail records and find out the abnormal communication detail records.
出处 《电讯技术》 北大核心 2012年第2期234-240,共7页 Telecommunication Engineering
基金 国家自然科学基金资助项目(11072089) 广州市科技计划项目(2010J-E341)~~
关键词 CDMA2000 移动网络 防盗用 数据挖掘 原始计费话单 筛选 CDMA2000 mobile network security data mining original billing screening
  • 相关文献

参考文献7

  • 1RFC2903, Generic AAA Architecture[S].
  • 2RFC2865, Remote Authentication Dial In User Service (RA- DIUS) [ S].
  • 3RADIUS Interim Update at Call Connect[ S].
  • 4RFCl122, Requirements for Intemet Hosts- Communication Layers[S].
  • 5中国电信CDMAlx工程AAA话单格式[S].
  • 6HanJW,KamberM著.数据挖掘概念与技术[M].范明,孟小峰译.北京:机械工业出版社,2007.
  • 7THERMO N. TQ analyst user's guide[M]. Madison: Thermo Nicolet Corporation, 1992.27-69.

共引文献13

同被引文献10

  • 1Mitton D, Johns M S, Barkley S, et al. Authentication, authorization and accounting: protocol evaluation[Z]. 2001.
  • 2Koutsabasis P, Vlachogiannis E, Darzentas J S. Beyond specifications: towards a practical methodology for evaluating web accessibility[J]. Journal of Usability Studies, 2010,5(4): 157-171.
  • 3Vicente Luque Centeno, Carlos Delgado Kloos, Jesfis Arias Fisteus, et al. Web Accessibility Evaluation Tools: A Survey and Some Improvements[J]. Electronic Notes in Theoretical Computer Science (ENTCS), 2006,157(2): 87-100.
  • 4Paddison C, Englefield accessibility inspections[J] 2009,16(3): 507-521.
  • 5P. Applying heuristics to Interacting with Computers, Anand Rajaraman, Jeffrey David Ullman. Mining of Massive Datasets[M]. London: Cambridge University Press, 2011: 1-17.
  • 6Manning C D, Raghavan P, Schutze H. Introduction to Information Retrieval[M]. London: Cambridge University Press, 2008: 100-103.
  • 7Gao H, Yegneswaran V, Chen Y, et al. An Empirical Reexamination of Global DNS Behavior [J]. Computer Communication Review, 2013,43(4): 267-278.
  • 8Hao S, Feamster N, Pandrangi R. Monitoring the initial DNS behavior of malicious domains [A]. Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference[C]. ACM, 2011: 269-278.
  • 9夏秦,王志文,卢柯.入侵检测系统利用信息熵检测网络攻击的方法[J].西安交通大学学报,2013,47(2):14-19. 被引量:47
  • 10杨宏宇,常媛.基于K均值多重主成分分析的App-DDoS检测方法[J].通信学报,2014,35(5):16-24. 被引量:13

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部