期刊文献+

基于小波的网络流量异常协同相变检测 被引量:1

Synergetic phase transition detection method for network traffic anomolies based on wavelet
下载PDF
导出
摘要 针对网络流量表现出的非线性和非平稳性等复杂的动力学特征,提出一种基于小波的网络流量异常协同相变检测方法。该方法从网络流量时间序列的离散小波域出发,利用序参量的非线性动力学方程描述网络流量系统的复杂行为,采用势函数来刻画网络流量系统的非平稳相变过程,进一步分析了网络流量状态与各种攻击模式之间的变化关系,并通过协同学模型对网络流量序参量进行演化,当相应序参量收敛时,即可检测到相应的攻击模式或是正常流量模式。最后,采用了DARPA 1999数据集进行了实验测试,网络流量异常的平均检测率达到了90.00%,而平均误检率只有15.03%。实验结果表明,基于小波的协同相变方法可以用于网络流量异常检测。 According to the nonlinear and non-stationary dynamic characteristics of the network traffic, the technique based on synergetic phase transition theory was proposed for detecting network traffic anomalies. By using the nonlinear dynamic equation of the order parameter, the paper described the complex behaviors of the network traffic system in discrete wavelet domain of the network traffic time series and the potential function was used to characterize non-stationary phase transition process of the network traffic system. The relationship between network traffic status and the various attack patterns was analyzed, and the synergetic model was used to calculate the network traffic order parameter. When the corresponding order parameter converged, the corresponding attack pattern or the normal traffic pattern could he detected. Finally, the DARPA 1999 data set was used to evaluate the proposed method. The average detection rate is 90.00% and the average false alarm rate is 15.03%. The experimental results show that the proposed method is effective for the network traffic anomaly detection.
作者 熊伟
出处 《计算机应用》 CSCD 北大核心 2012年第8期2271-2274,共4页 journal of Computer Applications
基金 中南民族大学中央高校基本科研业务费专项资金资助项目(CZQ12010)
关键词 异常检测 网络流量 协同学 小波 序参量 anomaly detection network traffic synergetics wavelet order parameter
  • 相关文献

参考文献14

  • 1ADAS A. Traffic models in broadband networks[J].IEEE Communications Magazine, 1997,35(7): 82-89.
  • 2SANG A, LI S-Q. A predictability analysis of network traffic[J].Computer Networks,2002,39(4): 329-345.
  • 3ZHANG Y, LEE W. Intrusion detection in wireless Ad-Hoc networks[C] // MobiCom '00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. New York: ACM, 2000: 275-283.
  • 4QIAO Y, XIN X W, BIN Y, et al. Anomaly intrusion detection method based on HMM[J].Electronics Letters,2002,38(13): 663-664.
  • 5PASCHALIDIS I C, SMARAGDAKIS G. Spatio-temporal network anomaly detection by assessing deviations of empirical measures[J].IEEE/ACM Transactions on Networking, 2009,17(3): 685-697.
  • 6刘运,蔡志平,钟平,殷建平,程杰仁.基于条件随机场的DDoS攻击检测方法[J].软件学报,2011,22(8):1897-1910. 被引量:14
  • 7任勋益,王汝传,王海艳.基于自相似检测DDoS攻击的小波分析方法[J].通信学报,2006,27(5):6-11. 被引量:56
  • 8袁坚,任勇,刘锋,山秀明.复杂计算机网络中的相变和整体关联行为[J].物理学报,2001,50(7):1220-1225. 被引量:12
  • 9陆锦军,王执铨.基于相空间重构的网络流量RBF神经网络预测(英文)[J].Transactions of Nanjing University of Aeronautics and Astronautics,2006,23(4):316-322. 被引量:4
  • 10DAUBECHIES I. Ten lectures on wavelets[M]. Philadelphia: Society for Industrial and Applied Mathematics,2006.

二级参考文献52

共引文献92

同被引文献13

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部