期刊文献+

大规模网络异常流量实时云监测平台研究 被引量:13

Cloud Platform based Real-time Monitoring of the Abnormal Traffic in Massive-scale Network
下载PDF
导出
摘要 网络安全问题呈现出隐蔽性越发增强、攻击更加持久、杀伤力波及更广等特征。单一或少数的数据源很难发现更加隐蔽的异常事件,同时一些针对入侵检测的数据挖掘、神经网络、关联规则、决策分类的算法由于算法本身的原因,对于大规模的数据存在计算能力上的瓶颈。文章提出了一种基于大数据平台的大规模网络异常流量实时监测系统架构,并讨论了关键技术和方法。该平台将离线的批处理计算和实时的流式处理计算相结合,通过对流量、日志等网络安全大数据的分析,实现对于DDoS、蠕虫、扫描、密码探测等异常流量的实时监测。 Concealment of the network security problems appear increasingly strengthen, more durable, lethality spread more widely. A single or a few data sources is dififcult to ifnd more concealed abnormal network events. Meaning while, facing the huge-scale data some methods such as data mining, classiifcation, neural network, association rules, decision algorism, as the reason itself, are still existing the bottlenecks in the computing power. Base on the big data platform, the article puts forward a real-time monitoring system architecture to detect the abnormal trafifc in the massive network. The article discusses the key technologies and methods. The platform build up an architecture combining the oflfine batch computing and real-time streaming processing together. Through the analysis of the lfow rate, security logs and other large source data, it implements to monitor the network at instance and detect the abnormal lfow in real-time, such as DDoS attack, worms, scanning, and password probe.
出处 《信息网络安全》 2014年第9期1-5,共5页 Netinfo Security
基金 国家自然科学基金[61272450]
关键词 网络异常流量 云监测 大规模网络 网络安全大数据 network abnormal trafifl cloud computing detection massive-scale network big data of network security
  • 相关文献

参考文献8

  • 1陈吉荣,乐嘉锦.基于Hadoop生态系统的大数据解决方案综述[J].计算机工程与科学,2013,35(10):25-35. 被引量:116
  • 2金松昌,方滨兴,杨树强,等.基于Hadoop的网络安全日志分析系统的设计与实现[A].中国计算机学会计算机安全专业委员会.全国计算机安全学术交流会论文集.第二十五卷|C].2010:6.
  • 3Zaharia M, Chowdhury M, Franklin M J, et al. Spark: clustercomputing with working sets[C]//Proceedings of the 2nd USENIXconference on Hot topics in cloud computing. 2010: 10.
  • 4Zaharia M, Chowdhury M, Das T, et al. Resilient distributeddatasets: A fault-tolerant abstraction for in-memory clustercomputing[C]//Proceedings of the 9th USENIX conference onNetworked Systems Design and Implementation. USENIX Association,2012: 2.
  • 5Andrew Moore, Denis Zuev, Michael Crogan. I ) for use in flow—basedclassification [M]. University of London 2005.
  • 6何震凯.基于聚类分析的网络流量分类研究[D].株洲:湖南工业大学,2009.
  • 7穆祥昆,王劲松,薛羽丰,黄玮.基于活跃熵的网络异常流量检测方法[J].通信学报,2013,34(S2):51-57. 被引量:20
  • 8Pang—Ning Tan, Michael Steinbach, Vipin Kumar. Itroduction to DataMining[M].北京:人民邮电出版社,2010 : 33-38.

二级参考文献9

共引文献134

同被引文献88

引证文献13

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部