期刊文献+

基于通信痕迹的网络威胁分区方法研究

Network Threat Partition Method Based on the Communication Trace
下载PDF
导出
摘要 当前的网络攻击检测都没有充分考虑攻击的直接联系性,对攻击内在的直接关联缺少关注,导致攻击分类和网络威胁分区的准确性不高。为了解决这一问题,提出一种基于通信痕迹的网络威胁分区方法。通过提取网络威胁内在特有的主成份特征,构建出上一次攻击留下的通信痕迹,根据通信痕迹的反馈对本次攻击进行分区,保证同区域内的攻击特征类似,为后期的攻击图谱构建打下基础。计算机仿真实验证明,该方法可以很好的解决网络威胁检测缺少关联性的弊端,提高了入侵检测的准确度。 The current network attack detection, are not fully considered directly attack item that the lack of direct attack the intrinsic connection between attention, lead to the classification of network attacks and threats partition accuracy is not high. In order to solve this problem, this paper puts forward a trace based on communication network threat partition method. Through the extraction network threat intrinsic characteristic of principal component characteristics, constructing the last attack left traces of communication, according to the communication traces of this feedback attack partitions, guarantee in the areas with similar attack characteristics, for later attack map construction to lay the foundation. The computer simulation proved that change method can well solve the network to threat the disadvantages of lack of correla-tion detection and improve the intrusion detection accuracy.
出处 《科技通报》 北大核心 2014年第2期127-129,共3页 Bulletin of Science and Technology
关键词 通信痕迹 网络危险 分区 communication mark network danger partition
  • 相关文献

参考文献6

二级参考文献70

  • 1于海斌,曾鹏,王忠锋,梁英,尚志军.分布式无线传感器网络通信协议研究[J].通信学报,2004,25(10):102-110. 被引量:119
  • 2屈玉贵,翟羽佳,蔺智挺,赵保华,张英堂.一种新的无线传感器网络传感器放置模型[J].北京邮电大学学报,2004,27(6):1-5. 被引量:24
  • 3邹仕洪,张丽娜,程时端.一种高效的移动自组网MAC协议[J].北京邮电大学学报,2005,28(1):43-47. 被引量:13
  • 4闻英友 ,冯永新 ,王光兴 .无线传感器网络中基于伸展树的感知节点分布优化[J].自动化学报,2005,31(5):737-742. 被引量:4
  • 5Bulusu N,Heidemann J,Estrin D.GPS-Less low cost outdoor localization for very small devices.IEEE Personal Communications Magazine,2000,7(5):28-34.
  • 6He H,Huang C,Blum BM,Stankovic JA,Abdelzaher TF.Range-Free localization schemes in large scale sensor networks.In:Johnson DB,ed.Proc.of the ACM MobiCom 2003.San Diego:ACM Press,2003.81-95.
  • 7Romer K,Zurich E.The lighthouse location system for smart dust.In:Siewiorek D,ed.Proc.of the 1st Int'l Conf.on Mobile Systems,Applications,and Services.San Francisco:ACM Press,2004.15-30.
  • 8Okabe A,Boots B,Sugihara K,Chiu S.Spatial Tessellations:Concepts and Applications of Voronoi Diagram.2nd ed.,New York:John Wiley & Sons,1999.
  • 9Hochbaum DS.Approximation Algorithms for NP-Hard Problems.Cambridge:PWS Publishing Company,1995.
  • 10Cormen TH,Leiserson CE,Rivest RL,Stein C.Introduction to Algorithms.2nd ed.,Cambridge:MIT Press,2001.

共引文献230

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部