期刊文献+

基于配置语句树的网络设备配置异常检测算法

Anomaly Detection Algorithm for Network Device Configuration Based on Configuration Statement Tree
下载PDF
导出
摘要 随着网络通信设备的发展,设备配置异常引发的问题日益显著。传统的检测工具通常只针对拼写、格式等进行检测,无法检测逻辑问题。因此,目前的配置异常检测工作高度依赖工程师经验。为了提高网络服务质量并减少工程师的重复工作,以及解决传统工具检测速度慢、检测能力弱、通用性差等问题,文中借鉴了抽象语法树的设计理念,创新性地提出了一种基于“配置语句树”的无监督异常检测算法。通过统计分析,该算法可以确定7种可检测异常类型,并支持异常定位和异常修改方案的推荐。文中采用运营商现网运营中的配置,根据算法可检测种类、运行时间、准确率和召回率这几个指标进行量化评估和对比分析。实验结果表明,该算法具有良好的鲁棒性,完全能够有效应对网络设备配置异常引发的网络通信问题。 The problem of device configuration anomalies is becoming increasingly significant with the development of network communication equipment.Traditional detection tools usually only detect spelling,formatting and other issues,and cannot identify logic problems.Consequently,engineers’experience plays a critical role in detecting such anomalies.To improve network service quality,reduce repetitive work,and address issues like slow detection speed,weak detection capabilities,and poor versatility of traditional tools,this paper draws on the design concept of abstract syntax trees and proposes an innovative unsupervised anomaly detection algorithm based on“configuration statement trees.”It can identify seven types of detectable anomalies and provides recommendations for anomaly localization and modification plans.The paper evaluates and compares the algorithm based on indicators such as detectable types,runtime,accuracy,and recall using configurations from the operator’s current network operation.The results demonstrate that the algorithm has good robustness and can effectively address network communication issues resulting from configuration anomalies in network communication equipment.
作者 沈袁程 班瑞 陈昕 华润多 汪云海 SHEN Yuancheng;BAN Rui;CHEN Xin;HUA Runduo;WANG Yunhai(School of Computer Science and Technology,Shandong University,Qingdao,Shandong 266200,China;China Information Technology Designing&Consulting Institute,Beijing 100000,China)
出处 《计算机科学》 CSCD 北大核心 2023年第S02期614-623,共10页 Computer Science
基金 国家重点研发计划(2022ZD0160805) 面向泛在计算环境大数据可视分析的人机交互理论与方法(62141217)。
关键词 异常检测 聚类分析 设备自动巡检 抽象语法树 共现语料分析 无监督学习 关联分析 Anomaly detection Cluster analysis Automatic inspection of equipment Abstract syntax tree Co-occurrence corpus analysis Unsupervised learning Association analysis
  • 相关文献

参考文献4

二级参考文献30

  • 1陈淳鑫,阎光.MD5算法在B/S结构下口令验证中的应用[J].微型机与应用,2005,24(2):7-9. 被引量:6
  • 2王伟,郭锡泉.一次一密DES算法的设计[J].计算机安全,2006(5):17-18. 被引量:5
  • 3刘晓星,胡畅霞,刘明生.安全加密算法DES的分析与改进[J].微计算机信息,2006,22(04X):32-33. 被引量:40
  • 4唐德权,王绪峰,朱林立,谢文君.一种快速挖掘频繁项集算法的研究[J].湖南科技学院学报,2006,27(5):117-120. 被引量:3
  • 5Halabi B.Internet Routing Architectures[M].Indianopolis:Cisco Press,Second Edition,2001.
  • 6Kent S,Lynn C,Seo K.Secure Border Gateway Protocol (Secure-BGP)[J].IEEE Journal on Selected Areas in Communications,2000,18(4):582-592.
  • 7Murphy S.Border Gateway Protocol Security Analysis[EB/OL].IETF Internet Draft,draft-murphy-bgp-vuln-00.txt.Nov.2001.
  • 8Cowie J,Ogielski A,Premore B,et al.Global Routing Instabilities During Code Red Ⅱ and Nimda Worm Propagation[EB/OL].http://www.renesys.com/projects/bgpinstability.
  • 9Misel S A.Wow,AS7007! NANOG Mail Archives[EB/OL].http://www.merit.edu/mail.archives/nanog/1997-04/msg00340.html.
  • 10Mahajan R,et al.Understanding BGP Misconfiguration[A].ACM SIGCOMM' 2002[C],2002.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部