期刊文献+

基于FRFT自相似参数估计的异常流量检测方法 被引量:3

Anomaly traffic detection using Hurst estimation based on FRFT
下载PDF
导出
摘要 针对传统异常流量检测方法检测精度较低,Hurst指数估计受估计序列尺度的影响,提出了基于分数阶傅里叶变换(FRFT)估计Hurst指数的方法。在此基础上,实现了基于Hurst指数变化的异常检测,有效解决了方法实现过程中FRFT最佳估计的分数阶阶数选择及Hurst参数求解的关键问题。实验表明,基于FRFT的估计不受序列非平稳性影响,对Hurst指数估计具有较高的估计精度,并且可以准确地检测网络异常。 Since traditional abnormal detection methods have poor performance,and Hurst parameter estimation was affected by non-stationary traffic,this paper designed the FRFT estimation method.On that basis,it implemented the abnormal detection method based on Hurst parameter variation.In addition,it resolved key issues of choice of suitable fractional order and calculation of Hurst.The experimental results show that FRFT estimation method is not affect by non-stationary traffic,which has better performance on Hurst estimation,and FRFT detection method identify abnormal traffic accurately.
出处 《计算机应用研究》 CSCD 北大核心 2013年第6期1783-1785,1789,共4页 Application Research of Computers
基金 国家"973"计划重点资助项目(2012CB315901) 国家"863"计划资助项目(2011AA01A103)
关键词 自相似 分数阶傅里叶变换 小波变换 异常检测 self-similarity FRFT(fractional Fourier transform) wavelet transform abnormal detection
  • 相关文献

参考文献12

  • 1LELAND W E,TAQQU M S,WILLINGER W,et al. On the self-similar nature of Ethernet traffic ( extended version ) [ J ]. IEEE/AGM Trans on Networking, 1994,2 ( 1 ) : 1-15.
  • 2GIORGI G, NARDUZZI C. A study of measurement-based traffic models for network diagnostics[J]. IEEE Trans on Instrumentation and Measurement,2008,57 ( 8 ) : 1642-1650.
  • 3LI M, LIM S C, HUB J, et al. Towards describing multi-fractality of traffic using local hurst function [ C ]//Proc of the 7th International Conference on Computational Science. 2007:1012-1020.
  • 4ABRY P, VEITCH D. Wavelet analysis of long range dependent traffic [J]. IEEE Trans on Infor Theory,1998,44(1) :2-15.
  • 5任勋益,王汝传,王海艳.基于自相似检测DDoS攻击的小波分析方法[J].通信学报,2006,27(5):6-11. 被引量:56
  • 6GARCIA R C, SADUKU M N O, CANNADY J D. WAID: wavelet analysis intrusion detection, circuits and system [ C]//Proc of the 45 th Midwest Symposium. 2002 : 688- 691.
  • 7BORGNAT P,DAWAELE G,FUKUDA K,et al. Seven years and one day : sketching the evolution of Internet traffic [ C ]//Proc of the 28th Conference on Computer Communications. [ S. l. ] : IEEE Press ,2009 : 711-719.
  • 8LI Mu-hai, LI Ming. A new approach for detecting DDoS attacks based on wavelet analysis [ C ]//Proc of the 2nd International Congress on Image and Signal Processing. 2009 : 1-5.
  • 9CHEN Yang-quan, SUN Rong-tao, ZHOU An-hong. An improved Hurst parameter estimator based on fractional Fouier transform [ J ]. Telecommunication Systems,2009,43(3/4) :197-206.
  • 10SUN Rong-tao, CHEN Yang-quan, ZAVERI N, et al. Local analysis of long-range dependence based on fractional Fourier transform [ C ]// Proc of IEEE Mountain Workshop on Adaptive and Learning Systems. 2006 : 13-18.

二级参考文献26

  • 1邹柏贤,姚志强.一种网络流量平稳化方法[J].通信学报,2004,25(8):14-23. 被引量:18
  • 2孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报,2005,28(5):767-773. 被引量:55
  • 3王升辉,裘正定.结合多重分形的网络流量非线性预测[J].通信学报,2007,28(2):45-50. 被引量:40
  • 4CHANG R K C.Defending against flooding-based distributed denial-of-service attack:a tutorial[J].IEEE Comm Magazine,2002,40(10):42-51.
  • 5LAU F,RUBIN S H,SMITH M H.Distributed denial of service attacks[A].Proceedings of the IEEE International Conference on Systems,Man,and Cybernetics[C].Nashville,2000.2275-2280.
  • 6LELAND W,TAQQU M,WILLINGER W.On the self-similar nature of Ethernet traffic (Extended Version)[J].IEEE/ACM Trans on Networking,1994,2(1):1-15.
  • 7PAXSON V,FLOYD S.Wide area traffic:the failure of poisson modeling[J].IEEE/ACM Trans on Networking,1995,3(3):226-244.
  • 8DANG T D,MOLNAR S.On the Effects of Non-Staionarity in Long Range Dependent Tests[R].Budapest Univ Technology and Economics Tech Rep,Budapest,Hungary,1999.
  • 9ABRY P,VEITCH D.Wavelet analysis of long range dependent traffic[J].IEEE Trans on Infor Theory,1998,44(1):2-15.
  • 10李弻程,罗建书.小波分析及其应用[M].北京:电子工业出版社,2003.

共引文献144

同被引文献35

  • 1李淑霞,王汝霖,李春梅,许亮,李国新.基于噪声方差估计的小波阈值图像去噪新方法[J].计算机应用研究,2007,24(1):220-221. 被引量:17
  • 2Zhi Hua Zhou, Xu Ying Liu. Training cost - sensitive neural net- works with methodsaddressing the class imbalance problem [ J ]. IEEE Trans on Knowledge and Data Engineering,2006,18 (1) : 63 - 77.
  • 3Seung - Jae Jang, Young - Gu Lee, Kwang - Hyung Lee et al.. A Study on Group Key Agreement in Sensor Network Environments U- sing Two - Dimensional Arrays [ J ]. Sensors, 2011,11 ( 12 ) : 36 -53.
  • 4WANG Xiu - ying, XIAO Li - zhong, SHAO Zhi - qing. Approach to Anomaly Traffic Detection in a Local Network [ J ]. Journal of Donghua University ,2009,6:656 - 661.
  • 5MIN Ge-yong, JIN Xiao-long. Analytical modelling and optimization of congestion control for prioritized multi-class self, similar traffic [ J ]. IEEE Zrans on Communications,2013,6( 1 ) :257-265.
  • 6IFTIKHAR M,SHOUKAT I A,SALMAN H,et al. The explicit analy- sis of polling systems combined with non-preemptive priority schedu- ling under self-similar traffic input [ C ]//Proc of Computing, Commu- nications and IT Applications Conference. 2013 : 141-146.
  • 7LI Xiao-long, LU Han-cheng, LU Hao. QoS analysis of self-similar multimedia traffic with variable packet size in wireless networks [C ]//Proc of the 78th IEEE Vehicular Technology Conference. 2013:1-5.
  • 8HAN Hong-cheng,XUE Gao-fei, WANG Yuan-ming, et al. An adap-tire active queue management algorithm [ C]//Proe of the 3rd Inter- national Conference on Consumer Electronics, Communications and Networks. 2013:72-75.
  • 9THAKUR G S,PAN H,HELMY A. Oil the existence of self-similarity in large-scale vehicular networks [ C ]//Proc of the 9th lntenlational Wireless Communications and Mobile Computing Contorence. 2013: 1756-1761.
  • 10MANDELBROT B B, Van NESS J W. Fractional Cattssian molitms, fractional noises and applications [ J ]. SIAM Review, 1968,10 ( 4 ) : 422-437.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部