期刊文献+

基于改进TSVM的未知网络应用识别算法 被引量:3

Unknown network applications traffic classification algorithm based on improved TSVM
下载PDF
导出
摘要 针对训练集中出现未知网络应用样本的识别问题,提出一种基于改进的直推式支持向量机的未知网络应用识别算法,引入增类损失函数刻画在训练过程中新增的未知应用样本的损失代价,建立TSVM的优化问题并推导其求解过程,使得构造的分类模型能够实现对未知类别样本的识别。通过实际网络数据集进行仿真分析,结果表明所提出的算法在识别未知网络应用的可行性和有效性方面均有良好表现。 An unknown network protocol classification method based on improved transductive support vector machine learning is proposed to solve the problem of classifying augmented class when unknown network protocol data appeared in the training process.This method uses the large number of unlabeled samples to assist training classification model, where the augment loss of new un-known class samples is described by the loss augment function. TSVM( Transductive Support Vector Machine) optimization model is established and its solving process is deduced, so the decision boundary can classify the unknown class samples. The performance of the proposed method is examined in simulations with real network data sets. The experimental results illustrate the feasibility and effectiveness of the unknown network applications classified by this proposed method.
作者 李斌 李丽娟
出处 《电子技术应用》 北大核心 2016年第9期95-98,共4页 Application of Electronic Technique
基金 国家自然科学基金(61309007) 国家安全重大基础研究项目(613148)
关键词 支持向量机 直推式学习 未知网络应用 流量识别 support vector machine transductive learning unknown network protocol traffic classification
  • 相关文献

参考文献10

  • 1王一鹏,云晓春,张永铮,李书豪.基于主动学习和SVM方法的网络协议识别技术[J].通信学报,2013,34(10):135-142. 被引量:13
  • 2KUZBORSKIJ I,ORABONA F,CAPUTO B.From n to n+l: Multiclass transfer incremental learning[C].Proce.of the 26th IEEE Conference on Computer Vision and Pattern Recog- nition, 2013 : 3358-3365.
  • 3王变琴,余顺争.未知网络应用流量的自动提取方法[J].通信学报,2014,35(7):164-171. 被引量:7
  • 4ZHOU Z H, LI M.Tri-training:Exploiting unlabeled data using three classifiers[J].Knowledge and Data Engineering, IEEE Transactions on, 2005,17(11) : 1529-1541.
  • 5李洋,方滨兴,郭莉,陈友.基于直推式方法的网络异常检测方法[J].软件学报,2007,18(10):2595-2604. 被引量:26
  • 6LEE Y, LIN Y, WAHBA G.Multi-category support vector machines, theory, and application to the classification of microarray data and satellite radiance data[J].Joumal of the American Statistical Association, 2004,99 (465) : 67- 81.
  • 7COLLOBERT R, SINZ F,WESTON J, et al.Large scale transductive SYMs[J].The Journal of Machine Learning Research, 2006,7(8) : 1687-1712.
  • 8BOTTOU L,LIN C J.Support vector machine solvers[J]. Large Scale Kernel Machines, 2007,3(1) : 301-320.
  • 9WAWI Working Group.Packet traces from WIDE backbone [EB/OL].[2016-03].http ://mawi.wide. ad.jp/mawi/.
  • 10ALLWEIN E L, SCHAPIRE R E, SINGER Y.Reducing multiclass to binary:A unifying approach for margin classifiers[J].The Journal of Machine Learning Research, 2001,1 (2) : 113-141.

二级参考文献50

  • 1赵咏,姚秋林,张志斌,郭莉,方滨兴.TPCAD:一种文本类多协议特征自动发现方法[J].通信学报,2009,30(S1):28-35. 被引量:10
  • 2李昆仑,黄厚宽,田盛丰,刘振鹏,刘志强.模糊多类支持向量机及其在入侵检测中的应用[J].计算机学报,2005,28(2):274-280. 被引量:49
  • 3诸葛建伟,王大为,陈昱,叶志远,邹维.基于D-S证据理论的网络异常检测方法[J].软件学报,2006,17(3):463-471. 被引量:54
  • 4Intemet netflow statistics[EB/OL], http://netflow.intemet2.edu, 2010.
  • 5TCP and UDP port numbers[EB/OL], http://www.iana.org/assignments/ port-numbers, 2008.
  • 6ROUGHAN M, SEN S, SPATSCHECK O, et al. Class-of-service mapping for QoS: a statistical signature-based approach to IP tratTtc classification[A]. Proceedings of the 4th ACM SIGCOMM Conference on Interact Measurement[C]. Taormina, Sicily, Italy, 2004.135-148.
  • 7ZHANG J, CHEN C, XIANG Y. An effective network traffic classifi- cation method with unknown flow detection[J]. IEEE Transactions on Network and Service Management, 2013, 10(1):1-15.
  • 8KARAGIANNIS T, PAPAGIANNAKI K, FALOUTSOS M. BLINC: multilevel traffic classification in the dark[J]. SIGCOMM Computer Communication Review, 2005, 35(4):229-240.
  • 9CABALLERO J, YIN H, LIANG Z, et al. Polyglot: automatic extrac- tion of protocol message format using dynamic binary analysis[A]. Proceedings of the 14th ACM Conference on Computer and Commu- nications Security[C]. Virginia, USA, 2007.317-329.
  • 10L1N Z, JIANG X, XU D, et al. Automatic protocol format reverse engineering through context-aware monitored execution[A]. Proceed- ings of the 15th Network and Distributed System Security Sympo- sium[C]. California, USA, 2008.1-17.

共引文献42

同被引文献24

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部