期刊文献+

基于半监督的网络流精细化识别方法研究

Research on network traffic fine recognition based on semi-supervision
下载PDF
导出
摘要 为了实现复杂网络环境下网络应用的精细化识别管理,文章在半监督的机器算法基础上,集合HMM和VSM的优点,提出基于HMM和VSM混合模型的识别算法,利用网络流统计特征属性实现网络流精细化识别.实验结果显示HMM和VSM混合算法能够有效识别加密协议及复杂网络协议的应用,并且达到较高的识别率,其分类的精度明显优于传统识别算法. In order to realize the fine identification management of the network application in the complex network environment,this paper combines the advantages of HMM and VSM on the basis of semi supervised machine algorithm,and proposes a hybrid algorithm based on HMM and VSM,using the network flow statistical characteristics of flow properties of fine recognition. The experimental results show that the HMM and VSM hybrid algorithm can effectively identify the encryption protocol and the application of complex network protocols,and achieve high recognition rate,and the classification accuracy is superior to the traditional recognition algorithm.
作者 陈绣瑶
出处 《广州大学学报(自然科学版)》 CAS 2017年第5期67-71,共5页 Journal of Guangzhou University:Natural Science Edition
基金 2017年度广州市哲学社会科学发展"十三五"规划资助课题(2017GZGJ10)
关键词 网络流 精细化识别 半监督 HMM模型 VSM模型 network flow fine recognition semi-supervision HMM model VSM model
  • 相关文献

参考文献2

二级参考文献97

  • 1李和平,胡占义,吴毅红,吴福朝.基于半监督学习的行为建模与异常检测[J].软件学报,2007,18(3):527-537. 被引量:30
  • 2谢逸,余顺争.基于Web用户浏览行为的统计异常检测[J].软件学报,2007,18(4):967-977. 被引量:42
  • 3邬书跃,田新广.基于隐马尔可夫模型的用户行为异常检测新方法[J].通信学报,2007,28(4):38-43. 被引量:20
  • 4Bilmes JA.What HMMs can do.IEICE TRANSACTIONS on Information and Systems,2006,89(3):1-24.
  • 5Rabiner LR A tutorial on hidden Markov models and selected applications in speech recognition.Proc.of IEEE,1989,77(2):257-286.
  • 6Yamato J,Ohya J,Ishii K.Recognition human actionin time sequential images using hidden Markov model.Proc.of IEEE Conference on Computer Vision and Pattern Recognition.LosAlamitos,CA:IEEE,1992:379-385.
  • 7Bregler C.Learning and recognizing human dynamics in video sequences.Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.Los Alamitos,CA:IEEE,1997:568-574.
  • 8Forrest S,Hoflneyr SA,Somayaji A,Longstaff TA.A sense of self for UNIX processes.Proc.of the 1996IEEE Symposium on Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,1996:120-128.
  • 9Warrender C,Forrest SI,Pearlmuter B.Detecting Intrusions Using System Calls:Alternative Data Models.1999 IEEE Symposium on Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,1999:133-145.
  • 10Beal MJ,Ghahramani Z,Rasmussen CE.The Infinite Hidden Markov Model.Dietterich ed.Advances in Neural Information Processing Systems.Cambridge,MA:MIT Press,2002:577-584.

共引文献91

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部