期刊文献+

基于流特性的网络流量异常检测研究 被引量:6

NETWORK TRAFFIC ANOMALY DETECTION BASED ON FLOW FEATURE
原文传递
导出
摘要 随着因特网规模的不断扩大和复杂化,各种异常行为频繁发生.有效地检测出网络中的流量异常行为,对于保证网络正常运行具有很重要的意义.文章提出了一种根据非饱和链路中的流特性的网络流量异常检测算法.该算法综合利用了指数加权移动平均(exponentially weighted moving average,EWMA)预测模型检测突变异常和均衡模型(equilibrium model,EQM)检测相关性流异常的能力,对链路流量进行建模,检测链路中流量异常.实验结果分析表明:对比于其他检测算法,文章提出的方法能够有效地检测多类异常,并具有很好的检测效果. As the expanding and increasing of the complexity of the internet, a variety of anomalies occur in the network. Effectively detecting the abnormal traffic behaviors is very important to guarantee the reliable operation of the network. In this paper, we propose an anomaly detection method based on traffic flow feature in a non-saturated link. To model and detect the anomalies of the network link traffic, this method utilizes the ability of EWMA forecasting model to detect the burst anomalies and the equilibrium model to detect the correlated flow anomalies. Experiment analysis demonstrate that, compared to other detection methods, our method could successfully detect several kinds of anomalies with preferable detection performance.
出处 《系统科学与数学》 CSCD 北大核心 2015年第10期1127-1134,共8页 Journal of Systems Science and Mathematical Sciences
基金 国家自然科学基金(61174124 61233003) 高等学校博士点基金(20123402110029) 安徽省高校自然科学研究项目(KJ2012A286)资助课题
关键词 异常检测 EWMA 均衡模型 相关流. Anomaly detection, EWMA, equilibrium model, correlated flow.
  • 相关文献

参考文献16

  • 1罗娜,李爱平,吴泉源,陆华彪.基于概要数据结构可溯源的异常检测方法[J].软件学报,2009,20(10):2899-2906. 被引量:10
  • 2Silveira F, Diot C, Taft N, Govindan R. ASTUTE: Detecting a different class of traffic anomalies. ACM SIGCOMM Computer Communication Review, 2010, 40(4): 267-278.
  • 3杨雅辉.网络流量异常检测及分析的研究[J].计算机科学,2008,35(5):108-112. 被引量:13
  • 4Barford P, Plonka D. Characteristic of network traffic flow anomalies. Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, 2001, 69-73.
  • 5Yegneswaran V, Barford P, Ullrich J. Internet intrusions: Global characteristics and prevalence. ACM SIGMETRICS Pertormance Evaluation Review, 2003, 31(1): 138-147.
  • 6Lakhina A, Crovella M, Diot C. Diagnosing network-wide traffic anomalies. ACM SIGCOMM Computer Communication Review, 2004, 34(4): 219-230.
  • 7Lakhina A, Crovella M, Diot C. Mining anomalies using traffic feature distributions. ACM SIG- COMM Computer Communication Review, 2005, 35(4): 217-228.
  • 8钱叶魁,陈鸣,叶立新,刘凤荣,朱少卫,张晗.基于多尺度主成分分析的全网络异常检测方法[J].软件学报,2012,23(2):361-377. 被引量:43
  • 9Zhang Y, Singh S, Sen S, Duffield N. Online identification of hierarchical heavy hitters: Al- gorithms, evaluation, and applications. Proceedings of the 4th ACM SIGCOMM conference on Internet Measurement, 2004, 101-114.
  • 10Cormode G, Muthukrishnan S. What's new: Finding significant differences in network data streams. IEEE/ACM Transactions on Networking, 2005, 13(6): 1219-1232.

二级参考文献49

  • 1孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报,2005,28(5):767-773. 被引量:55
  • 2任勋益,王汝传,王海艳.基于自相似检测DDoS攻击的小波分析方法[J].通信学报,2006,27(5):6-11. 被引量:56
  • 3林果园,郭山清,黄皓,曹天杰.基于动态行为和特征模式的异常检测模型[J].计算机学报,2006,29(9):1553-1560. 被引量:25
  • 4谢逸,余顺争.基于Web用户浏览行为的统计异常检测[J].软件学报,2007,18(4):967-977. 被引量:42
  • 5邬书跃,田新广.基于隐马尔可夫模型的用户行为异常检测新方法[J].通信学报,2007,28(4):38-43. 被引量:20
  • 6Lakhina A, Crovella M, Diot C. Diagnosing network-wide traffic anomalies. In: Proc. of the 2004 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communication. New York: ACM Press, 2004. 219-230. http://portal.acm.org/citation.cfm?id=1015492.
  • 7Krishnamurthy B, Sen S, Zhang Y, Chcn Y. Sketch-Based change detection: Methods, evaluation, and applications. In: Proc. of the ACM SIGCOMM Internet Measurement Conf. New York: ACM Press, 2003. 234-247. http://portal.acm.org/citation.cfm?id= 948236.
  • 8Schweller R, Li ZC, Chen Y, Gao Y, Gupta A. Reverse hashing for high-speed network monitoring: Algorithms, evaluation, and applications. In: Proc. of the 25th IEEE Int'l Conf. on Computer Communications. New York: IEEE, 2006. 1397-1408.
  • 9Dewaele G, Fukuda K, Borgnat P. Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. In: Proc. of the Int'l Multimedia Conf. of the 2007 Workshop: Large Scale Attack Defense. New York: ACM Press, 2007. 145-152. http://portal.acm.org/citation.cfm?id=1352664.1352675.
  • 10Muthukrishnan S. Data streams: Algorithms and applications. 2007. http://www.cs.rutgers.vdu/-muthu/stream-1-1.ps.

共引文献62

同被引文献46

引证文献6

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部