期刊文献+

一种基于马尔可夫的负载均衡方法

A Balancing Algorithm of Markov-based State
下载PDF
导出
摘要 对于采用并行的高速网络入侵检测系统,负载均衡能力是一个重要的性能指标。多数的负载均衡算法都是根据检测引擎的负载情况来动态地分配数据流。提出了一种基于马尔可夫的负载均衡方法,根据流量分配的历史序列,来决定当前数据流的分配。同时结合当前系统的负载情况,来实现数据流的合理分配。 For the parallel high-speed network intrusion detection system,load balance ability is an important performance indicator.Most of the load balancing algorithms is based on the load of the detection engine,to the distribution of the dynamic data flow.This paper proposes a method called a balancing algorithm of markov-based state,and it is according to the flow rate distribution in the sequence of history to determine current data flow distribution,and this method is markov forecast method.Data flow distribution is realized by probability of every detective node with consideration of both markov state sequence and load conditions.
作者 陈敏 龚勋
出处 《计算机安全》 2012年第11期11-14,共4页 Network & Computer Security
关键词 并行网络入侵检测 负载均衡 流分配 马尔可夫 状态概率 Parallel network intrusions detect load balance traffic dispatch markov chain state probability
  • 相关文献

参考文献7

  • 1Shi W, Mac Gregor MH, et al. Adaptive load balancer for multiprocessor touters[A]. University of Alberta, T6G 2E8, 2004. http://www, cs. ualberta, ca/-pawel/PAPEPRS/.
  • 2Dittmann G, Herkersdorf A. Network processor load balancing for high-speed links[EB/OL], http://www, research.ibm. com/people/g/gdittma/pulications/Loadbalancer _Dittmann. pdf.
  • 3I. Charitakis, K. Ansgnostakis, and E. Markatos, et al. An active traffic splitter architecture for intrusion detection[J]. IEEE transactions on dependahie and secure computing, 2006,3(1):31 -43.
  • 4Ju Yeon Jo, et al. Internet traffic load balancing using dynamic hashing with flow volume[A]. In: proc. SPIE ITCom, 2002.
  • 5蒋文保,郝双,戴一奇,刘庭华.高速网络入侵检测系统负载均衡策略与算法分析[J].清华大学学报(自然科学版),2006,46(1):106-110. 被引量:29
  • 6邢永康,马少平.一种基于Markov链模型的动态聚类方法[J].计算机研究与发展,2003,40(2):130-135. 被引量:9
  • 7田新广,高立志,孙春来,张尔扬.基于系统调用和齐次Markov链模型的程序行为异常检测[J].计算机研究与发展,2007,44(9):1538-1544. 被引量:19

二级参考文献26

  • 1田新广,高立志,张尔扬.新的基于机器学习的入侵检测方法[J].通信学报,2006,27(6):108-114. 被引量:15
  • 2Schaelicke L,Slabach T,Moore B,et al.Characterizing the performance of network intrusion detection sensors[A].Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection (RAID 2003)[C].Lecture Notes in Computer Science,Springer-Verlag,2003.
  • 3Coit J,Staniford S,McAlerney J.Towards faster string matching for intrusion detection or exceeding the speed of snort[A].Proc DARPA Information Survivability Conference and Exposition (DISCEX Ⅱ '02)[C].Los Alamitos,Calif:IEEE CS Press,2001.367-373.
  • 4Edwards S.Vulnerabilities of Network Intrusion Detection Systems:Realizing and Overcoming the Risks[Z].Toplayer Networks,2002.
  • 5Kruegel C,Valeur F,Vigna G,et al.Stateful intrusion detection for high-speed networks[A].Proceedings of the IEEE Symposium on Security and Privacy[C].Berkeley,CA:IEEE,2002.285-294.
  • 6Asser N.Tantawi,Don Towsley.Optimal static load balancing in distributed computer systems[J].Journal of the ACM,1985,32(2):445-465.
  • 7Keith W R,David D Y.Optimal load balancing and scheduling in a distributed computer system[J].Journal of the ACM,1991,38(3):676-690.
  • 8T Oates. Identifying distinctive subsequence in multivariate time series by clustering. In: Proc of the 16th Int'l Conf on Machine Learning. Morgan Kaufmann Publishers Inc, 1999. 128~135
  • 9马振华等.现代应用数学手册--概率统计与随机过程卷.北京:清华大学出版社,2001(Ma Zhenhua et al. The Handbook of Modem Application Mathematics: Volume for Probability Statistics and Stochastic Process (in Chinese). Beijing: Tsinghua University Press, 2001)
  • 10I Zuckerman, D Albrecht, A Nicholson. Predicting user' s requestson the WWW. In: Proc of the 7th Int'l Conf on User Modeling. New York: Springer, 1999. 275~284

共引文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部