期刊文献+

基于CUSUM算法的流量异常检测

Abnormal Detection on Network Traffic Based on CUSUM
下载PDF
导出
摘要 互联网的飞速发展让人们的生活越来越方便、快捷.而网络安全问题逐渐成为互联网的关键问题.为保证网络正常运行,需要对网络中的异常流量进行监测和分析,以发现可能存在的攻击或危害,提前做到防范.本文将CUSUM算法应用于网络流量异常检测中,通过试验,对网络异常进行报警. The rapid development of the Internet makes people's life more and more convenient and fast.The problem of network security has become the key problem of the internet.In order to ensure the normal operation of the network,the need for monitoring and analysis of the abnormal network traffic,to find out the possible attack or harm,and to prevent in advance,the CUSUM algorithm was applied to the network traffic abnormal detection and the network abnormal alarming.
作者 邓绯
出处 《佳木斯大学学报(自然科学版)》 CAS 2016年第3期411-412,共2页 Journal of Jiamusi University:Natural Science Edition
基金 四川省教育厅自然科学重点项目(14ZA0311)成果之一
关键词 CUSUM 网络流量 异常检测 CUSUM network traffic abnormal detection
  • 相关文献

参考文献2

二级参考文献16

  • 1孙知信,唐益慰,程媛.基于改进CUSUM算法的路由器异常流量检测[J].软件学报,2005,16(12):2117-2123. 被引量:27
  • 2吕军,李星.一种网络流量异常检测算法[J].计算机应用研究,2006,23(11):217-219. 被引量:11
  • 3李金明,王汝传.基于VTP方法的DDoS攻击实时检测技术研究[J].电子学报,2007,35(4):791-796. 被引量:18
  • 4Arbor Networks. Network infrastructure security report [EB/OL]. [20011 - 2 - 1 ]. http ://www. arbornetworks. com/report.
  • 5Siris V A, Papagalou F. Application of anomaly detection algorithms for detecting SYN flooding attacks [C] // Proceedings of the Confereace on Global Telecom. IEEE, 2004: 2050-2054.
  • 6Wang H N, Zhang D L, Kang G S. Detecting SYN flooding attacks [J]. IEEE Computer and Communication Society, 2002,3 (6): 1530-1539.
  • 7Sun C H, Fan J D, Liu B. A robust scheme to detect SYN flooding attacks [C] //Proceedings of the Second International Conference on Communications and Networking in China ChinaCom , Aug 22-24, 2007: 397-401.
  • 8Moustakides G V. Performance of CUSUM tests for detecting changes in continuous time processes [C] // Proceedings IEEE International Symposium on Information Theory, IEEE ISIT'2002: 186-187.
  • 9Symantec internet security threat report [EB/OL]. [2008 - 04 - 08]. http: ///www. symantec.com/business/ theme jsp? themeid=threatreport.
  • 10J MIRKOVIC, G PRIER, P REIHER. Attacking DDOS at the source [C]// Network Protocols 2002 Proceedings lOth IEEE International Conference, 2002.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部