期刊文献+

测度属性关系分析的分布式系统异常检测

Anomaly Detection for Distributed System Based on Measurement Attributes Analysis
原文传递
导出
摘要 针对分布式系统的特点,提出了一种基于网格空间的测度属性关联度计算方法,并以此建立了网络模型来刻画分布式系统测度属性的关系;提出了基于隐马尔可夫模型的测度属性关系网络划分方法;利用最新监测的属性关联度信息,设计了基于测度属性关系网络划分的分布式系统异常检测算法;对多种攻击进行异常检测实验,从而验证了提出方法的有效性. The anomaly detection methods based on measurement attributes relationship analysis is pro- posed. The correlation between the measurement attributes in space grid structure is calculated, and hereby the relationship network model of measurement attributes is established. The network segmentation method is put forward based on hidden Markov model. The anomaly detection algorithm for distributed systems is designed by using the newest monitoring attributes correlation. The anomaly detection experi- ments demonstrate the effectiveness of the proposed method.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2013年第6期69-73,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(61100008 61073041 61073043) 中央高校基本科研业务费专项资金项目(HEUCF061002)
关键词 分布式系统 测度属性 关系网络划分 异常检测 distribution system measurement attribute relationship segmentation anomaly detection
  • 相关文献

参考文献2

二级参考文献12

  • 1G. Cavalleri and E. Tonni (UniversitáCattolica del Sacro Cuore,v. Trieste 17, 25121 Brescia, Italy).Physical and Mathematical Errors in the Alleged Planck-Ether Theory. A Vindication of Max Planck[J].Journal of Systems Engineering and Electronics,1995,6(4):129-136. 被引量:2
  • 2徐勋华,王继成.支撑向量机的多类分类方法[J].微电子学与计算机,2004,21(10):149-152. 被引量:27
  • 3张义荣,鲜明,肖顺平,王国玉.一种基于粗糙集属性约简的支持向量异常入侵检测方法[J].计算机科学,2006,33(6):64-68. 被引量:20
  • 4Ortalo R,Deswarte Y,Kaaniche M.Experimenting withquantitative evaluation tools for monitoring operational se-curity[J].IEEE Transactions on Software Engineering,1999,25(05):633-650.
  • 5Swiler L P,Phillips C,Ellis D.Computer attack graphgeneration tool[C] ∥Proc of the Second DARPA Informa-tion Survivability Conference&Exposition(DISCEX II).Anaheim:[s.n.] ,2001:307-321.
  • 6Ammann P,Wijesekera D,Kaushik S.Scalable graph-based network vulnerability analysis[C] ∥Proc of the 9thACM Conference on Computer and Communications Secu-rity.New York:[s.n.] ,2002:217-224.
  • 7Noel S,Jajodia S.Managing attack graph complexitythrough visual hierarchical aggregation[C] ∥Proc of the2004 ACM Workshop on Visualization and Data Miningfor Computer Security.Washington DC:[s.n.] ,2004:109-118.
  • 8Zhang Tao,Hu Mingzeng,Li Dong.An effective methodto generate attack graph[C] ∥Proc of International Con-ference on Machine Learning and Cybernetics.Guang-zhou:[s.n.] ,2005:3926-3931.
  • 9The MITRE Corporation.Common attack pattern enumer-ation and classification[EB/OL].2011.http:∥capec.mitre.org/data/dictionary.html.
  • 10肖海军,王小非,洪帆,崔国华.基于特征选择和支持向量机的异常检测[J].华中科技大学学报(自然科学版),2008,36(3):99-102. 被引量:11

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部