期刊文献+

运载火箭测发网络异常流量识别技术 被引量:3

Abnormal traffic flow identification for a measurement and control network for launch vehicles
原文传递
导出
摘要 运载火箭测发网络系统是维系运载火箭各系统远距离测试发射控制的重要国防信息基础设施,测发网络流量数据的精准分析是检测异常行为和保障信息安全的关键举措。该文综合利用端口映射识别、载荷特征识别、统计分析和支持向量机(SVM)学习算法,构建动态混合识别策略,通过端口映射和载荷特征识别获取机器学习训练样本,利用信息增益完成特征选择,构建SVM机器学习识别模型并进行样本训练,建立投票机制实现流量数据综合分析。利用测发网络真实数据进行测试表明:该算法识别准确度达99.1%,并有效地降低了人工判决分析的次数。 The measurement and control network of a launch vehicle is an important national defense information infrastructure for remote measurements and launch control. This network provides a key measure to detect abnormal behavior and ensure information security through accurate analysis of the traffic. This paper describes a network strategy using the port mapping method, payload matching, and support vector machine (SVM) learning algorithm. The training samples are produced by the port mapping and payload matching method. Then, the key features are selected based on the information gain. Next, the SVM model is built with these features and trained by the training samples. The traffic data is then analyzed by the voting mechanism. Actual data from the network is used to verify the method with the results showing that this method has an accuracy of 99. 1 with far fewer manual analyses.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2018年第1期20-26,34,共8页 Journal of Tsinghua University(Science and Technology)
关键词 运载火箭测发网络 端口映射 载荷精确特征匹配 动态混合策略 支持向量机(SVM)学习 measurement and control network of launch vehicle port mapping payload matching dynamic strategy support vector machine (SVM) learning
  • 相关文献

参考文献2

二级参考文献13

  • 1Subhabrata Sen,Jia Wang.Analyzing Peer-to-Peer Traffic across Large Networks[C].In:IEEE/ACM Transactions on Networking,NJ:IEEE Press,2004:219~232
  • 2IANA[S].http://www.iana.org/assignments/port-numbers
  • 3Myung-Sup Kim,Young J Won,James Won-Ki Hong.Application-Level Traffic Monitoring and an Analysis on IP Networks[J].ETRI Journal,2005;27(11):22~42
  • 4Subhabrata Sen,Oliver Spatscheck,Dongmei Wang.Accurate,Scalable In-Network Identification of P2P Traffic Using Application Signatures[C].In:Proceedings of the 13th international conference on World Wide Web,NY:ACM Press,2004:512~521
  • 5Luca Deri,NETikos,SPA.Improving passive packet capture:beyond device polling.http://jake.unipi.it/Ring.pdf,2004-10/2005-11
  • 6BitTorrent.http://www.bittorrent.com/protocol.html
  • 7Yoram Kulbak,Danny Bickson.The eMule Protocol Specification.http://ftp.citkit.ru/pub/sourceforge/e/em/emule/protocol_guide.pdf,2005 -01/2005-11
  • 8MSN Messenger Protocol.http://www.hypothetic.org/docs/msn/index.php
  • 9R Movva,W Lai.MSN Messenger Service 1.0 Protocol.http://www.hypothetic.org/docs/msn/sitev1/index.php,2003-09-/2005-11
  • 10Simple Mail Transfer Protocol[S].RFC 2821

共引文献49

同被引文献30

引证文献3

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部