期刊文献+

公共资源网络中资源滥用行为检测研究仿真

Research and Simulation of Resource Abuse Detection in Public Resource Network
下载PDF
导出
摘要 传统网络资源行为检测方法无法准确确定资源行为的符号观测,导致检测效果较差,整体检测严重受限。为此,提出一种新的基于隐马尔科夫模型的公共资源滥用行为检测方法。构建隐马尔科夫模型,通过数据分析,确定当前观测符号序列,利用Windows操作系统信息为蓝本进行行为检测。建立敏感文件信息集,并使其分布在系统敏感文件夹中。在此基础上确定当前隐马尔科夫模型参数。计算对应序列概率差值,根据当前公共资源网络信息安全要求,设定实际阈值,确定资源滥用行为。仿真实验结果表明,该监测方法真实有效,具有较高的推广和应用价值。 The traditional network resource behavior detection method can not accurately determine the symbol observation of resource behavior,resulting in poor detection effect and severe limitation of overall detection.Therefore,a new detection method of public resource abuse based on hidden markov model is proposed.The hidden markov model is constructed to determine the current observation symbol sequence through data analysis.And the behavior detection is based on the information of Windows operating system.A set of sensitive file information is constructed and distributed it in system sensitive folders.On this basis,the current hidden markov model parameters are determined.The probability difference value of corresponding sequence is calculated,and the actual threshold value is set to determine the resource abuse behavior according to the current information security requirements of public resource network.The simulation results show that the monitoring method is reallistic and effective,and has higher generalization and application performance.
作者 冯喆 侯霄昱 陈彦霖 FENG Zhe;HOU Xiaoyu;CHEN Yanlin(School of Computer Engineering,Coventry University Coventry,Coventry CV15FB,England;Division of Integrated Planning,Tianjin Tobacco Monopoly Bureau,Tianjin 300041,China;School of Management,Tianjin Normal University,Tianjin 300387,China;Ptirty Construction Section,Tianjin NO.1 Urban District Tobacco Monopoly Bureau,Tianjin 300050,China;Department of Arts and Sciences,Guangdong Institute,Zhanjiang 524400,China)
出处 《吉林大学学报(信息科学版)》 CAS 2020年第3期335-340,共6页 Journal of Jilin University(Information Science Edition)
基金 广东文理职业学院2017年“创新强校工程”品牌专业基金资助项目(GWL201703004)。
关键词 公共资源 网络行为 训练参数 public resources network behavior training parameters
  • 相关文献

参考文献15

二级参考文献95

  • 1周浩,龙立荣.共同方法偏差的统计检验与控制方法[J].心理科学进展,2004,12(6):942-950. 被引量:3516
  • 2沙勇忠,阎劲松,苏云.网络环境下科研人员的信息行为分析[J].情报科学,2006,24(4):485-491. 被引量:36
  • 3孙长亮,何峻,肖怀铁.基于ROC曲线的目标识别性能评估方法[J].雷达科学与技术,2007,5(1):17-21. 被引量:17
  • 4D Cappelli,A Moore,R Trzeciak,et al.Common Sense Guide to Prevention and Detection of Insider Version 3.1[R].Carnegie Mellon University,2009.
  • 5S StolfoJ,S Bellovin,S Hershkop,et al.Insider Attack and Cyber Security:Beyond the Hacker[M].New York:Springer,Science+ Business Media,2008.70-71.
  • 6G Viscusi,A Chassany.Societe Generale Reports EU4.9 Billion Trading Loss[DB/OL].http://www,bloomberg,com/apps/news? /pid = 20601087&sid = azUPx3TKR8zs,2008.
  • 7A Srivastava,A Kundu,S Sural,et al.Credit card fraud deteclion using hidden markov model[J].IEEE Transactions on Dependable and Secure Computing,2008,5(1):37-48.
  • 8W Lee,S Stolfo,P Chan,et al.Real time data mining-based intrusion detection[A].Proceedings of the 2001 DARPA Information Survivability Conference and Exposition Ⅱ[C].Wisconsin:World Scientific and Engineering Academy and Society (WSEAS),2001.89-100.
  • 9A Singhal.Data Warehousing and Data Mining Techniques for Computer Security[M].New York:Springer-Verlag,2006.83103.
  • 10L Ertoz,E Eilertson,A Lazarevic,et al.MINDS-Minnesota intrusion detection system[A].Kargupta H,Joshi A,Sivakumar K,et al.Next Generation Data Mining[M].New York:MIT/AAAI Press.2004.65-86.

共引文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部