期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Automatically Mining Application Signatures for Lightweight Deep Packet Inspection
1
作者 鲁刚 张宏莉 +3 位作者 张宇 Mahmoud T. Qassrawi 余翔湛 彭立志 《China Communications》 SCIE CSCD 2013年第6期86-99,共14页
Automatic signature generation approaches have been widely applied in recent traffic classification.However,they are not suitable for LightWeight Deep Packet Inspection(LW_DPI) since their generated signatures are mat... Automatic signature generation approaches have been widely applied in recent traffic classification.However,they are not suitable for LightWeight Deep Packet Inspection(LW_DPI) since their generated signatures are matched through a search of the entire application data.On the basis of LW_DPI schemes,we present two Hierarchical Clustering(HC) algorithms:HC_TCP and HC_UDP,which can generate byte signatures from TCP and UDP packet payloads respectively.In particular,HC_TCP and HC_ UDP can extract the positions of byte signatures in packet payloads.Further,in order to deal with the case in which byte signatures cannot be derived,we develop an algorithm for generating bit signatures.Compared with the LASER algorithm and Suffix Tree(ST)-based algorithm,the proposed algorithms are better in terms of both classification accuracy and speed.Moreover,the experimental results indicate that,as long as the application-protocol header exists,it is possible to automatically derive reliable and accurate signatures combined with their positions in packet payloads. 展开更多
关键词 traffic classification automatic signature generation association mining hierarchical clustering LW_ DPI
下载PDF
Network Traffic Signature Generation Mechanism Using Principal Component Analysis
2
作者 牟澄 黄小红 +1 位作者 吴军 马严 《China Communications》 SCIE CSCD 2013年第11期95-106,共12页
The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.Howev... The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.However,the major limitation of DPI systems is that their signature library is mainly extracted manually,which makes it hard to efficiently obtain the signature of new applications.Hence,in this paper,we propose an automatic signature extraction mechanism using Principal Component Analysis(PCA)technology,which is able to extract the signature automatically.In the proposed method,the signatures are expressed in the form of serial consistent sequences constructed by principal components instead of normally separated substrings in the original data extracted from the traditional methods.Extensive experiments based on numerous sets of data have been carried out to evaluate the performance of the proposed scheme,and the results prove that the newly proposed method can achieve good performance in terms of accuracy and efficiency. 展开更多
关键词 network traffic classification aut-omatic signature generation deep packet in-spection principal component analysis
下载PDF
An Enhanced Automated Signature Generation Algorithm for Polymorphic Malware Detection
3
作者 Ke Tang Ming-Tian Zhou Zhi-Hong Zuo 《Journal of Electronic Science and Technology》 CAS 2010年第2期114-121,共8页
Polymorphic malware is a secure menace for application of computer network systems because hacker can evade detection and launch stealthy attacks. In this paper, a novel enhanced automated signature generation (EASG... Polymorphic malware is a secure menace for application of computer network systems because hacker can evade detection and launch stealthy attacks. In this paper, a novel enhanced automated signature generation (EASG) algorithm to detect polymorphic malware is proposed. The EASG algorithm is composed of enhanced-expectation maximum algorithm and enhanced K-means clustering algorithm. In EASG algorithm, the fixed threshold value is replaced by the decision threshold of interval area. The false positive ratio can be controlled at low level, and the iterative operations and the execution time are effectively reduced. Moreover, the centroid updating is realized by application of similarity metric of Mahalanobis distance and incremental learning. Different malware group families are partitioned by the centroid updating. 展开更多
关键词 Index Terms -Entropy false positive ratio Mahalanobis distance polymorphie malware signature generation.
下载PDF
Fast Confidentiality-Preserving Authentication for Vehicular Ad Hoc Networks 被引量:1
4
作者 MIRZAEE Siavash JIANG Letian 《Journal of Shanghai Jiaotong university(Science)》 EI 2019年第1期31-40,共10页
This paper studies the existing problems of message authentication protocols in vehicular ad hoc networks(VANETs) due to their significance in the future of commuting and transportation. Our contribution has been devo... This paper studies the existing problems of message authentication protocols in vehicular ad hoc networks(VANETs) due to their significance in the future of commuting and transportation. Our contribution has been devoted to implementing a new protocol for VANETs so that inherent security problems in past works are resolved. Exclusive security measures have been considered for the system which protects the users against threat of any attack. The new protocol shows a great hardness guaranteed by certificate based 80 bit security which assures messages to remain confidential in any time. Also, new unprecedented features like V2 X which improves system performance effectively have been instantiated. The simulation results indicate that message signature generation and verification both take place in much less time than present comparable rival protocols. 展开更多
关键词 message authentication protocol vehicular ad hoc networks(VANETs) signature generation and verification
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部