期刊文献+

移动网络安全策略冲突检测方法的改进研究 被引量:5

Improvement research on conflict detection method for mobile network security scheme
下载PDF
导出
摘要 针对移动网络路由冲突导致安全性低的问题,提出基于Hilbert-Huang变换时频分析的移动网络安全冲突检测算法,构建路由冲突下的网络攻击信号模型,对移动网络的入侵信号进行经验模态分解实现谱特征分析和提取,采用HilbertHuang变换对移动网络入侵信号进行高低频组分分解,结合时频分析方法实现路由冲突下的入侵检测,提高网络安全性能。实验分析表明,采用该检测算法进行网络入侵检测的准确性较好,干扰对抗能力较强,是一种有效的移动网络安全策略。 In order to solve the low security problem caused by the mobile network routing conflict,the mobile network se?curity conflict detection algorithm based on Hilbert Huang transform time?frequency analysis is proposed. The network attack sig?nal model in routing conflict was constructed. The empirical mode was decomposed for the intrusion signal of the mobile network to analyze and extract the spectrum signature. The Hilbert?Huang transform is used to decompose the mobile network intrusionsignal according to the high and low frequency components. The time frequency analysis method is combined to detect the intru?sion in routing conflict,and improve the network security performance. The experimental analysis results show that the detection algorithm has high accuracy for network intrusion detection and strong anti?interference ability,and is an effective mobile net?work security scheme.
作者 周健 沈震群 ZHOU Jian;SHEN Zhenqun(Information Center,Suzhou Administration Institute,Suzhou 215011,China;Suzhou Imady Technologies Co.,Ltd.,Suzhou 215011,China)
出处 《现代电子技术》 北大核心 2017年第3期75-78,共4页 Modern Electronics Technique
关键词 移动网络 网络安全 路由冲突 网络入侵检测 mobile network network security routing conflict network intrusion detection
  • 相关文献

参考文献7

二级参考文献82

  • 1余顺争.Web负载流的宏观模式与识别[J].模式识别与人工智能,2005,18(1):31-37. 被引量:2
  • 2谢希仁.计算机网络[M].5版.北京:电子工业出版社,2010.
  • 3Mirkovic J, Reiher P. A Taxonomy of DDoS attack and DDoS defense mechanisms. ACM Sigcomm Computer Communications Review, 2004,34(2):39-53. [doi: 10.1145/997150.997156].
  • 4Sun ZX, Jiang JL, Jiao L. DDOS attack detecting and defending model. Journal of Software, 2007,18(9):2245-2258 (in Chinese with English abstract), http://www,jos.org.cn/1000-9825/18/2245.htm Idol: 10.1360/jos 182245].
  • 5Anderson T, Roscoe T, Wetherall D. Preventing Internet denial of service with capabilities. In: Proc. of the HotNets-II. 2003. 39-44. [doi: 10.1145/972374.972382].
  • 6Yang XW, Wetherall D, Anderson T. A DoS-limiting network architecture. In: Proc. of the ACM SIGCOMM 2005, Vol.35. 2005. 241-252. [doi: 10.1145/1080091.1080120].
  • 7Argyraki K, Cheriton DR. Scalable network-layer defense against Internet bandwidth-flooding attacks. IEEE/ACM Trans. on Networking, 2009,17(4): 1284-1297. [doi: 10.1109/TNET.2008.2007431 ].
  • 8Beaumont-Gay M. A comparison of SYN flood detection algorithms. In: Proc. of the 2nd Int'l Conf. on Internet Monitoring and Protection. 2007. [doi: 10.1109/ICIMP.2007.1].
  • 9Ohsita Y, Ata S, Murata M. Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically. In: Proc. of the IEEE Globecom. 2004. 2043-2049. [doi: 10.1109/GLOCOM.2004.1378371 ].
  • 10Kandula S, Katabi D, Jacob M, Berger AW. Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds. Technical Report, TR-969, MIT, 2004.

共引文献239

同被引文献53

引证文献5

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部