To detect the DoS in networks by applying association rules mining techniques, we propose that association rules and frequent itemsets can be employed to find DoS pattern in packet streams which describe traffic and u...To detect the DoS in networks by applying association rules mining techniques, we propose that association rules and frequent itemsets can be employed to find DoS pattern in packet streams which describe traffic and user behaviors. The method extracts information from the log analysis of submitted packets using the algorithm which depends on the definition of the intrusion. Large itemsets were extracted to represent the super facts to build the association analysis for the intrusion. Network data files were analysed for experiments. The analysis and experimental results are encouraging with better performance as packet frequency number increases.展开更多
An appropriate acquisition configuration in terms of signal quality can optimize the acquisition performance. In view of this, a new approach of acquisition assisted by the control voltage of automatic gain control(AG...An appropriate acquisition configuration in terms of signal quality can optimize the acquisition performance. In view of this, a new approach of acquisition assisted by the control voltage of automatic gain control(AGC) is proposed. This approach judges the signal power according to the AGC control voltage and switches the working modes correspondingly and adaptively. Non-coherent accumulation times and the detection threshold are reconfigured according to the working mode. Theoretical derivation and verification by simulation in typical situations are provided, and the algorithm is shown to be superior in terms of the mean acquisition time, especially in strong signal scenarios compared with the conventional algorithm.展开更多
文摘To detect the DoS in networks by applying association rules mining techniques, we propose that association rules and frequent itemsets can be employed to find DoS pattern in packet streams which describe traffic and user behaviors. The method extracts information from the log analysis of submitted packets using the algorithm which depends on the definition of the intrusion. Large itemsets were extracted to represent the super facts to build the association analysis for the intrusion. Network data files were analysed for experiments. The analysis and experimental results are encouraging with better performance as packet frequency number increases.
基金supported by the National Natural Science Foundation of China(Grant No.61401026)the National High Technology Research and Development Program of China(Grant No.2014AA1070)
文摘An appropriate acquisition configuration in terms of signal quality can optimize the acquisition performance. In view of this, a new approach of acquisition assisted by the control voltage of automatic gain control(AGC) is proposed. This approach judges the signal power according to the AGC control voltage and switches the working modes correspondingly and adaptively. Non-coherent accumulation times and the detection threshold are reconfigured according to the working mode. Theoretical derivation and verification by simulation in typical situations are provided, and the algorithm is shown to be superior in terms of the mean acquisition time, especially in strong signal scenarios compared with the conventional algorithm.