期刊文献+

基于多维聚类挖掘的异常检测方法研究 被引量:1

Multidimensional Clustering Based Anomaly Detection Research
下载PDF
导出
摘要 网络异常检测是网络管理中非常重要的课题,因此已在近年来得到广泛研究。人们在该领域提出了许多先进的网络流量异常检测方法,但是自动准确地对网络流量进行分类和识别来发现网络中的异常流量仍然是一个非常具有挑战性的问题。文中提出了一种基于多维聚类挖掘的异常检测方法,通过两个阶段来实现异常检测。第一阶段先通过多维聚类挖掘算法,自动对网络中的流量进行多维聚类,第二阶段通过计算多维聚类的异常度来实现异常检测。通过文中的方法,网络中的异常流量被自动归类到不同的有意义的聚类中,通过对这些聚类进行分析可以发现网络中的异常行为。最后通过实验对算法进行了验证,结果表明该方法能够有效检测网络中的异常流量。 Network anomaly detection which is a very important issue in network management has been extensively studied in recent years. Although people in the field made a number of advanced works, the accuracy of automatic classification of network traffic to detect and identify abnormal network traffic is still a very challenging problem. It presents a multidimensional clustering based anomaly detection method, by two stages to achieve anomaly detection. The first phase, through multidimensional clastering algorithms, network traffic is au- tomatically mined into different multidimensional clusters. The second phase calculates the degree of multidimensional clusters to achieve anomaly detection. By this method, the abnormal network traffic is automatically classified into different meaningful clusters, and then these clusters can be used to find network anomalies. Finally, this algorithm was validated through experiments, the results show that the method can effectively identify abnormal network traffic.
出处 《计算机技术与发展》 2012年第7期136-139,142,共5页 Computer Technology and Development
基金 江苏省自然科学基金项目(BK2010526) 教育部博士点基金项目(20103223110003) 南京邮电大学引进人才项目(NY209021)
关键词 聚类 异常检测 网络安全 clustering anomaly detection network security
  • 相关文献

参考文献12

  • 1严芬,王佳佳,赵金凤,殷新春.DDoS攻击检测综述[J].计算机应用研究,2008,25(4):966-969. 被引量:35
  • 2胡振宇,方滨兴,辛毅.网络蠕虫检测方法研究[J].微计算机信息,2008,24(6):64-65. 被引量:2
  • 3李和平,胡占义,吴毅红,吴福朝.基于半监督学习的行为建模与异常检测[J].软件学报,2007,18(3):527-537. 被引量:30
  • 4杨新宇,侯光霞,杨树森.带可信度评估的连续小波分布式拒绝服务攻击检测算法[J].西安交通大学学报,2008,42(8):936-939. 被引量:2
  • 5Barford P, Kline J, Plonka D. A signal analysis of network traf- fic anomalies [ C ]//Proceedings of ACM SIGCOMM Internet Measurement Workshop. [ s. l. ] : [ s. n. ] ,2002:71-82.
  • 6Kim S, Reddy A, Vannucci M. Detecting traffic anomalies through aggregate analysis of packet header data[ C]//Proc of Networking 2004 ( LNCS 3042 ). Berlin: Springer Verlag, 2004 : 1047-1059.
  • 7Chhabra P, John A,Saran H. PISA : antomatic extraction of traffic signatures [ C ]//Proe of Networking 2005 ( LNCS 3462 ). Berlin: Springer Verlag ,2005:730-742.
  • 8Estan C, Savage S, Varghese G. Automatically inferring pat- terns of resource consumption in network traffic [ C ]//Prec. ofACM SIC, COMM Confence. [s.l. ]:[s. n. ] ,2003.
  • 9Yasami Y, Mozaffari S P. A novel unsupervised classification approach for network anomaly detection by k-means clustering and ID3 decision tree learning method [ J ]. ACM Journal of Supercompufing ,2010,53 ( 1 ) :231-245.
  • 10Park N H, Oh S H, Lee W S. Anomaly intrusion detection byclustering transactional audit streams in a host computer[ J]. Information Sciences, 2010, 180 ( 12 ) : 2375 - 2389.

二级参考文献68

共引文献107

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部