期刊文献+

基于流量监测的用户流量行为分析 被引量:4

User's Traffic Behavior Analysis Based on Network Traffic Monitoring
下载PDF
导出
摘要 为了解决网络用户流量行为描述维度过高,且在海量网络用户流量行为数据中分析单用户流量行为比较困难的问题,提出一种基于流量监测的异常流量时间定位和用户定位方法.首先,基于网络流量特性提出一个较为完备的特征集,对网络用户流量行为进行全面描述.其次,提出一种基于偏离距离的特征选择规则,选择出适合于海量网络用户流量行为分析的优化特征集,实现网络用户异常流量行为的快速时间定位.最后,在异常流量行为发生时刻对单用户流量行为进行分析,从而定位发生异常流量行为的用户.实验结果表明,本系统对网络用户异常流量行为具有较好的检测效果. To overcome the lack of description dimension to network user systematic definition of network user's traffic behavior, high ' s traffic behavior and long time to analyze single network user' s traffic behavior from massive network data, a method of establishing user' s traffic behavior analysis system based on network traffic monitoring was proposed. First, a more complete feature set based on the characteristic of network traffic to describe network user' s traffic behavior was established. Second, a feature selection rule based on the deviation distance was proposed to select the optimized feature set for the analysis of massive users' traffic behavior and locate abnormal moment rapidly. Finally, the single network user's traffic behavior to locate the abnormal users who produce abnormal traffic behavior was analyzed. Results show that the system has an excellent detection of the abnormal user' s traffic behavior.
出处 《北京工业大学学报》 CAS CSCD 北大核心 2013年第11期1692-1699,共8页 Journal of Beijing University of Technology
基金 北京市自然科学基金资助项目(4123093) 北京市高等学校人才强教深化计划\中青年骨干人才培养计划资助项目(PHR201108016)
关键词 用户流量行为 流量监测 特征集 特征选择 user's traffic behavior traffic monitoring feature set feature selection
  • 相关文献

参考文献12

  • 1郑红艳,吴照林.用户行为异常检测模型[J].计算机系统应用,2009,18(8):190-192. 被引量:9
  • 2FARRAPOSO S, OWEZARSKI P, MONTEIO E scale tomographic algorithm for detecting and classifying traffic anomalies [ C ]// IEEE ICC ' 07. Glasgow: IEEE, 2007 : 363-370.
  • 3陈宁军,倪桂强,罗隽,潘志松.基于正常行为聚类的卫星通信网异常检测方法[J].解放军理工大学学报(自然科学版),2008,9(5):497-501. 被引量:3
  • 4DENNING D E. An intrusion-detection model [ J]. IEEE Transactions on Software Engineering, 1987, SE-13: 222- 232.
  • 5AULD T, MOORE A W, GULL S F. Bayesian neural networks for internet traffic classification [ J ]. IEEE Transactions on Neural Networks, 2007, 18 ( 1 ) : 223- 239.
  • 6MitchellTM著 曾华军 张银奎译.机器学习[M].北京:机械工业出版社,2003..
  • 7MAWI Working Group. Traffic traces [ EB/OL]. [2006- 04-25]. http://mawi, wide. ad. jp/mawi/.
  • 8The University of Waikato. Traffic traces [ EB/OL ]. [2004-05-07]. http: //wand, net. nz/wits/waikato/1/ 20040507-233830-64. php.
  • 9The University of Auckland. Traffic traces [ EB/OL ]. [ 2003-12-02 ], http: // wand, net. nz/wits/auck/8/ 20031202-090000. php,.
  • 10CAIDA. CAIDA data[ EB/OL]. [ 2007-08-28 ]. http :// www. caida, org/data/.

二级参考文献13

  • 1佟强,周园春,吴开超,阎保平.一种量化关联规则挖掘算法[J].计算机工程,2007,33(10):34-35. 被引量:10
  • 2吴玉,李岚,朱明.基于数据挖掘的入侵检测行为数据辨析[J].计算机技术与发展,2007,17(7):139-141. 被引量:2
  • 3WINKLER J R, PAGE W J. Intrusion and Anomaly detection in trusted systems[C]. Tucson AZ: Poceeding of the Fifth Annual Computer Security Applications Conference,1989.
  • 4ANDERSON D, FRIVOLD T, VALDES A. Nextgeneration intrusion Menlo Park: detection expert system (NIDES) a summary[R].Technical Report, SRI-CSI-95-07, SRI International, Computer Science Lab, 1995.
  • 5TENG H S, CHEN K, LU S C. Adaptive real-time anomaly detection using inductively generated sequential patterns[C]. Oakland CA: In Proceedings of the IEEE Symposium on Research in Security and Privacy, 1990.
  • 6LEE W, A data mining for constructing features and models for intrusion detection system[D]. Columbia: Columbia University, 1999.
  • 7WILLIAM P D, ANCHOR K P, BEBO J L, et al. CDIS: towards a computer immune system for detecting network intrusions[J]. Lectuer Notes in Computer Science, 2001(2212) : 117-133.
  • 8KIM D W, LEE K Y, LEE D,et al. Evaluation of the performance of clustering algorithms in Kernel-Induced feature space [J]. Pattern Recognition, 2005, (38) :607-611.
  • 9STEINBACH M,KARYPIS G,KUMAR V. A com- parison of document clustering techniques [R]. Minneapolis: Department of Comp Sci & Eng University of Minnesota, 2000.
  • 10HAN Jiawei, Micheline Kamber.数据挖掘概念与技术[M].第2版.范明,孟小峰,译.北京:机械工业出版社,2007.

共引文献54

同被引文献50

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部