期刊文献+

Linux系统异常监控模型研究 被引量:1

Research on Exception Monitoring Model for Linux System
下载PDF
导出
摘要 设计Linux系统异常监控模型。根据WN协议,当异常发生时,通过该协议将告警信息向其他多个主机传递。采用主元分析,并结合霍特林统计量及Q统计量对异常进行检测。在异常发生后,利用主元贡献图定位异常点。实验结果表明,该模型具有较高的异常监控准确率。 This paper designs exception monitoring model for Linux system.The Warn Notify(WN) protocol is designed for the model.When an exception occurs,the adoption of the protocol can be alarm information to be passed to other multiple hosts.Model uses Principal Component Analysis(PCA) combined with Hotelling's statistics and Q statistic for anomaly detection.After an exception occurs,the contribution plots getting by principal component method is used to target a specific detection point.Experimental results show that the model has high abnormal monitoring accuracy.
作者 薛冰 何燚
出处 《计算机工程》 CAS CSCD 2012年第5期139-141,共3页 Computer Engineering
基金 河南省重点科技攻关计划基金资助项目(102102210020)
关键词 异常监控 主元分析 告警传递 贡献图 exception monitoring Principal Component Analysis(PCA) alarm transmission contribution plots
  • 相关文献

参考文献7

  • 1陈小辉.基于数据挖掘算法的入侵检测方法[J].计算机工程,2010,36(17):72-73. 被引量:14
  • 2Snort Community.What is Snort[EB/OL].(2010-11-21).http://www.snort.org/.
  • 3靳雪翔,张毅,李力,胡坚明.Robust PCA-Based Abnormal Traffic Flow Pattern Isolation and Loop Detector Fault Detection[J].Tsinghua Science and Technology,2008,13(6):829-835. 被引量:3
  • 4Mark J,Cox R,Engelschall B,et al.OpenSSL Documents[EB/OL].(2010-10-21).http://www.openssl.org/docs/.
  • 5Williams J,Sullivan J,Birch K,et al.Maximum Value of Ho-telling’s T2 Statistics Based on the Successive Differences Covariance Matrix Estimator[J].Communications in Statistics-theory and Methods,2009,38(4):471-483.
  • 6Okamoto N,Miura N,Seo T,et al.On the Distributions of Some Test Statistics for Profile Analysis in Elliptical Populations[J].American Journal of Mathematical and Management Sciences,2006,26(2):1-31.
  • 7Zhang Junping,Wang Xiaodan,Krger U,et al.Principal Curve Algorithms for Partitioning High-dimensional Data Spaces[J].IEEE Transactions on Neural Networks,2011,22(3):367-380.

二级参考文献14

  • 1李洋.K-means聚类算法在入侵检测中的应用[J].计算机工程,2007,33(14):154-156. 被引量:23
  • 2Anderson J P.Computer Security Thread Monitoring and Surveillance[Z].[2009-08-11].http://csrc.nist.gov/publications/history/ande80.pdf.
  • 3Turochy R E,,Smith B L.Applying quality control to traffic condition monitoring[].Proceedings of IEEE Conference on Intelligent Transportation Systems.2000
  • 4Turochy R E.Enhancing short-term traffic forecasting with traffic condition information[].Journal of Transportation Engineering ASCE.2006
  • 5Smith B L,Williams B M,Oswald R K.Comparison of parametric and nonparametric models for traffic flow fore-casting[].Transportation ResearchPart CEmerging Tech-nologies.2002
  • 6Chen Y D,Hu J M,Zhang Y,Li Y.Traffic data analysis using kernel PCA and self-organizing map[].Proceedings of IEEE Intelligent Vehicles Symposium.2006
  • 7Dailey D J.Improved error detection for inductive loop sensors[].Report NoWA-RD Washington State De-partment of Transportation.1993
  • 8Nihan N.Aid to determining freeway metering rates and detecting loop errors[].Journal of Transportation Engineer-ing.1997
  • 9Golub G H,Van Loan C F.Matrix Computations[]..1996
  • 10Jolliffe I T.Principal Component Analysis[]..2002

共引文献15

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部