期刊文献+

网络应用流类别不平衡环境下的SSL加密应用流识别关键技术 被引量:4

Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class
下载PDF
导出
摘要 通过深入研究网络类别不平衡的原因,选择SMOTE(synthetic minority over-sampling technique)过抽样方法对数据集进行预处理,并充分利用特征匹配高准确性的优点识别和分拣出SSL加密流,进而利用基于互信息最大化的聚类方法和SVM分类方法进一步识别SSL加密应用,这种混合方法有效地结合了静态特征匹配和机器学习方法的优点.达到识别分类方法在准确性和识别速度的均衡。 Through a in-depth study about the reason of network class imbalance, a method called SMOTE was chosen over the data set sampling preprocess, making full use of the advantages which is high accuracy of traffic model feature matching identification and sorting out the encrypted SSL flow, and then using the clustering method and the SVM based on mutual information classification method to further identify SSL encryption specific application, like HrP3PS/POPS etc. The hybrid method effectively combines the advantages of static feature matching and machine learning methods, to achieve the balance of classification method on accuracy and speed.
出处 《电信科学》 北大核心 2015年第12期83-89,共7页 Telecommunications Science
基金 2013江苏省六大人才高峰计划项目 2013国家发展和改革委员会信息安全专项资助项目 国家电网公司2014年科技项目"电力信息通信网络流量预测和管道智能化关键技术研究及应用" 2015江苏省产学研前瞻性联合研究项目(No.BY2015011-02)~~
关键词 流量识别 流量分析 行为特征 行为建模 行为模型 traffic identification, traffic analysis, behavior characterization, behavior modeling, behavior pattern
  • 相关文献

参考文献5

二级参考文献47

  • 1熊刚,孟姣,曹自刚,王勇,郭莉,方滨兴.网络流量分类研究进展与展望[J].集成技术,2012,1(1):32-42. 被引量:23
  • 2于亦舟,欧海文.“串行检验”比较于传统的随机性检验方法的优越性[J].通信学报,2007,28(6):20-23. 被引量:4
  • 3Alshammari R, Zincir-Heywood AN. A flow based approach for SSH traffic detection. In: Proc. of the IEEE Int'l Conf. on Systems, Man and Cybernetics (ISIC). 2007. 296-301. [doi: 10.1109/ICSMC.2007.4414006].
  • 4Yu Q, Huo HW. Algorithms improving the storage efficiency of deep packet inspection. Ruan Jian Xue Bao/Journal of Software, 2011,22(1):149-163 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3724.htm [doi: 10.3724/SPJ.1001.2011. 03724].
  • 5Xu P, Lin S. Internet traffic classification using C4.5 decision tree. Ruan Jian Xue Bao/Journal of Software, 2009,20(10): 2692-2704 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3444.htm [doi: 10.3724/SP.J.1001.2009.03444].
  • 6Alshammari R, Zincir-Heywood AN. Generalization of signatures for SSH encrypted traffic identification. In: Proc. of the Computational Intelligence in Cyber Security. 2009. 167-174. [doi: 10.1109/CICYBS.2009.4925105].
  • 7Bernaille L, Teixeira R, Akodkenou I, Soule A, Salamation K. Traffic classification on the fly. SIGCOMM Computer Communication Review, 2006,36(2):23-26. [doi: 10.1145/1129582.1129589].
  • 8Bernaille L, Teixeira R. Early recognition of encrypted applications. In: Proc. of the 8th Int'l Conf. on Passive and Active Network Measurement (PAM 2007). Louvain-Ia-Neuve, 2007. 165-175. [doi: 10.1007/978-3-540-71617-4_17].
  • 9Alshammari R, Zincir-Heywood AN. Investigating two different approaches for encrypted traffic classification. In: Proc. of the 2008 Sixth Annual Conf. on Privacy, Security and Trust. 2008. 156-166. [doi: 10.1109/PST.2008.15].
  • 10Haffner P, Sen S, Spats check 0, Wang DM. ACAS: Automated construction of application signatures. In: Proc. of the ACM SIGCOMM Workshop on Mining Network Data. 2005.197-202. [doi: 10.1145/1080173.1080183].

共引文献93

同被引文献11

引证文献4

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部