期刊文献+

无线通信网络中流量分析技术综述 被引量:2

Overview of Network Traffic Analysis Techniques in Wireless Communication Networks
下载PDF
导出
摘要 对无线网络流量的分析和准确预测是无线网络管理与安全领域的重要研究内容之一,在网络规划、网络监控、流量趋势分析、网络优化以及入侵检测和异常检测等方面发挥着重要作用。介绍了目前典型的无线网络流量分析的模型与常用流量分析方法,综述了传统无线通信网络(如无线局域网和物联网)中的流量分析技术,指出了流量分析技术应用于无线自组网系统的可能性与面临的几点挑战,以及无线自组网系统与流量分析技术结合的发展方向。 The analysis of wireless network traffic and accurate prediction is one of the important research contents in the field of wireless network management and security,which plays an important role in such aspect as network planning,network monitoring,traffic trend analysis,network optimization,intrusion detection and anomaly detection.This paper introduces current typical wireless network traffic analysis models and common traffic analysis methods,and then summarizes the traffic analysis techniques in traditional wireless communication networks such as wireless local area network(WLAN)and the Internet of Things(IoT),and points out the possibility and challenges of applying traffic analysis technology to wireless ad hoc networks,as well as the development direction of the combination of wireless ad hoc network system and traffic analysis technology.
作者 程定国 曾浩洋 CHENG Dingguo;ZENG Haoyang(The 30th Research Institute of China Electronics Technology Group Corporation,Chengdu 610093,China)
出处 《电讯技术》 北大核心 2023年第3期441-447,共7页 Telecommunication Engineering
关键词 无线局域网(WLAN) 物联网(IoT) 流量分析 入侵检测 无线自组网络 wireless local area network(WLAN) Internet of Things(IoT) network traffic analysis intrusion detection wireless ad hoc network
  • 相关文献

参考文献2

二级参考文献15

  • 1李昆仑,黄厚宽,田盛丰,刘振鹏,刘志强.模糊多类支持向量机及其在入侵检测中的应用[J].计算机学报,2005,28(2):274-280. 被引量:49
  • 2肖云,韩崇昭,郑庆华,王清.一种基于多分类支持向量机的网络入侵检测方法[J].西安交通大学学报,2005,39(6):562-565. 被引量:13
  • 3诸葛建伟,王大为,陈昱,叶志远,邹维.基于D-S证据理论的网络异常检测方法[J].软件学报,2006,17(3):463-471. 被引量:54
  • 4Lee W, Stolfo S J. Data mining approaches for intrusion detection [C]// Proceedings of the 7th USENIX Security Symposium. San Antonio, USA: USENIX Assoc, 1998: 79-93.
  • 5Lippmann R P, Cunningham R K. Improving intrusion detection performance using keyword selection and neural networks [J]. Computer Networks, 2000, 34: 597-6O3.
  • 6Zhang Z, Li J, Manikopoulos C N, et al. HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification [C]// Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. West Point, NY: United States Military Academy, 2001: 85-90.
  • 7IEEE802.11 Working Group. 2007. IEEE standard for information technology- Telecorrmaunications and information exchange between systems-Local and metropolitan area networks-Specific requirements- Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications 2007 [EB/OL]. [2009-08-28]. http://standards. ieee. org/getieee802/ download/802.11-2007.pdf.
  • 8Welch C D J, Lathrop M S D. A Survey of 802. 11a Wireless Security Threats and Security Mechanisms [R]. West Point, New York: United States Military Academy, 2003.
  • 9Shafer G.A mathematical theory of evidence[M].Princeton:Princ- eton University Press,1976.
  • 10Lie Wennung, Su Chenkang.News video classification based on multi-model information fusion image processing[C]//Proc of 2005 IEEE International Conference on ICIE,2005.

共引文献16

同被引文献4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部