期刊文献+

基于混合特征的P2P流量识别方法 被引量:4

Hybrid Characteristics Based P2P Traffic Identification Methods
下载PDF
导出
摘要 研究P2P异常流量的识别问题。P2P网络节点特征属性较多,代表流量特征的属性存在多层属性,传统的流量识别方法以整体特征为基础,没有对流量特征属性进行进一步划分,一旦出现多识别特征的情况,单一类内的特征很难准确描述这种多流量特征,导致识别精度下降。为了避免上述传统算法的缺陷,提出了一种基于支持向量机增量学习算法的p2p流量识别方法。提取p2p流量混合特征,并将其作为p2p流量识别的依据。建立支持向量机增量学习模型,并对提取的流量混合特征进行有效的识别。实验结果表明,利用改进后的算法能够对异常流量进行准确的识别,提高异常流量识别率,降低误判率,从而有利于p2p网络的管理。 The identification problem of P2P abnormal traffic was studied in this paper. We proposed a p2p traffic identification method based on SVM incremental learning algorithm. Firstly, p2p traffic mix features were extracted to used as the basis of p2p traffic identification. Then a support vector machine incremental learning model was created, and the extracted traffic hybrid feature can be effectively identified. Experimental results show that taking the advan- tage of the improved algorithm can identify the abnormal traffic accurately, increase the recognition rate of abnormal traffic and reduce false positives, thus contributing to p2p network management.
作者 谭静 张治斌
出处 《计算机仿真》 CSCD 北大核心 2014年第3期316-319,共4页 Computer Simulation
基金 河南省软科学研究计划项目(102400450064)
关键词 异常流量 混合特征 流量识别 支持向量机增量学习算法 Abnormal traffic Hybrid characteristics Traffic identification Support vector machine incrementlearning algorithm
  • 相关文献

参考文献10

  • 1汤一平,富吉勇,陈耀宇.基于全方位计算机视觉的遗留物检测系统[J].计算机测量与控制,2010,18(3):517-519. 被引量:13
  • 2贾小军,喻擎苍.基于开源计算机视觉库OpenCV的图像处理[J].计算机应用与软件,2008,25(4):276-278. 被引量:67
  • 3Timothy S Newman, Hang Yi. A survey of the marching cubes al- gorithm [ J ]. Computers & Graphics, 2006,30 ( 5 ) : 854-879.
  • 4Ho Chien-Chang, et al. Cubical Marching Squares: Adaptive Fea- ture Preserving Surface Extraction from Volume Data[ J]. In Com- puter Graphics Forum, 2005,2d(3 ) : 537-545.
  • 5刘寅,滕晓龙,刘重庆.复杂背景下基于傅立叶描述子的手势识别[J].计算机仿真,2005,22(12):158-161. 被引量:30
  • 6P A errig, J Stankovic, D Wagner. Security in wireless sensor net- works[ J]. CACM, June 2004,47:53-57.
  • 7F Anjum, et al. On Optimal Placement of Intrusion Detection Mod- ules in Sensor Networks [ C ]. 1st International Conference on Broadband Networks. Washington: IEEE Press , 2004:433-439.
  • 8B Waters. Efficient identity-based encryption without random ora- cles[ C]. Advances in Cryptology-EUROCRYPT 2005. Berlin: Spfinger-Verlag, 2005:114-127.
  • 9Everthon Silva Fonseea, Rodrigo Capobianco Guido, Paulo Rogrrio Scalassara, Carlos Dias Maciel, Jos6 Carlos Pereira. Wavelet time- frequency analysis and least squares support vector machines for the identification of voiee disorders [ J ]. Computers in Biology and Medieine, 2007,37(4) :571-578.
  • 10Mohammad Saniee Abadeh, Jafar Habibi, Zeynab Barzegar, Mu- na Sergi. A parallel genetic local search algorithm for intrusion de- tection in computer networks[J]. Engineering Applications of Ar- tificial Intelligence, 2007,20(8) :1058-1069.

二级参考文献17

  • 1黎松,平西建,丁益洪.开放源代码的计算机视觉类库OpenCv的应用[J].计算机应用与软件,2005,22(8):134-136. 被引量:58
  • 2代科学,李国辉,涂丹,袁见.监控视频运动目标检测减背景技术的研究现状和展望[J].中国图象图形学报,2006,11(7):919-927. 被引量:169
  • 3汤一平,叶永杰,朱艺华,顾校凯.智能全方位视觉传感器及其应用研究[J].传感技术学报,2007,20(6):1316-1320. 被引量:49
  • 4Yingli Tian, Rogerio Feris, Arun Hamp-apur. Real--Time Detection of Abandoned and Removed Object in Complex Environments[A]. The Eighth International Workshop Visual Surveillance [C]. 20081 95-102.
  • 5刘德健,赵勇.遗留物检测方法及系统[P].中国专利:CN101231696,2008-07-30.
  • 6N. Bird, S. Atev, N. Caramelli, R. Martin, O. Masoud, N. Papanikolopoulos, "Real Time, Online Detection of Abandoned Objects in Public Areas"[A]. IEEE International Conference on Robotics and Automation [C]. May, 2006. 3775 - 3780.
  • 7Porikli F. Detection of temporarily static regions by processing video at different frame rates [A]. 2007 IEEE conference on advanced video and signal based surveillance [C]. 2007. 236 - 241.
  • 8P. KaewTraKulPong and R. Bowden. An improved adaptive background mixture model for real-- time tracking with shadow detection [ A]. in Proceedings of the 2nd European Workshop on Advanced Video-- Based Surveillance Systems [C]. Sept. 2001: pp. 274- 279.
  • 9Feng-Sheng Chen,Chih-Ming Fu,Chung-Lin Huang.Hand Gesture Recognition Using a Real-time Tracking Method and Hidden Markov Models[J].Image and Vision Computing 2003,21:745-758.
  • 10MilanSonka VaclavHlavac RogerBoyle.Image Processing Analysis and Machine Vision[M].人民邮电出版社,2003..

共引文献106

同被引文献37

引证文献4

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部