期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于局部信息熵的计算机网络高维数据离群点检测系统
1
作者 谭印 苏雯洁 《现代电子技术》 北大核心 2024年第10期91-95,共5页
通过离群点检测可以及时发现计算机网络中的异常,从而为风险预警和控制提供重要线索。为此,设计一种基于局部信息熵的计算机网络高维数据离群点检测系统。在高维数据采集模块中,利用Wireshark工具采集计算机网络原始高维数据包;并在高... 通过离群点检测可以及时发现计算机网络中的异常,从而为风险预警和控制提供重要线索。为此,设计一种基于局部信息熵的计算机网络高维数据离群点检测系统。在高维数据采集模块中,利用Wireshark工具采集计算机网络原始高维数据包;并在高维数据存储模块中建立MySQL数据库、Zooleeper数据库与Redis数据库,用于存储采集的高维数据包。在高维数据离群点检测模块中,通过微聚类划分算法划分存储的高维数据包,得到数个微聚类;然后计算各微聚类的局部信息熵,确定各微聚类内是否存在离群点;再依据偏离度挖掘微聚类内的离群点;最后,利用高维数据可视化模块呈现离群点检测结果。实验证明:所设计系统不仅可以有效采集计算机网络高维数据并划分计算机网络高维数据,还能够有效检测高维数据离群点,且离群点检测效率较快。 展开更多
关键词 计算机网络 高维数据 离群点检测 局部信息熵 wireshark工具 微聚类划分
下载PDF
基于EAP-TTLS的可信网络接入认证技术 被引量:2
2
作者 张立茹 鄢楚平 詹葆荣 《计算机与现代化》 2013年第10期110-113,116,共5页
为解决可信网络中网络访问层对客户端和服务器的双向身份认证以及完成对终端平台的完整性进行度量的任务,深入分析TNC网络访问层IF-T标准的要求和EAP-TTLS协议的结构,重点研究EAP-TTLS协议用于可信网络中的安全性和可靠性。基于TNC@FHH... 为解决可信网络中网络访问层对客户端和服务器的双向身份认证以及完成对终端平台的完整性进行度量的任务,深入分析TNC网络访问层IF-T标准的要求和EAP-TTLS协议的结构,重点研究EAP-TTLS协议用于可信网络中的安全性和可靠性。基于TNC@FHH开源框架将EAP-TTLS协议应用于可信网络,使用Wireshark抓包工具抓取接入认证过程的报文,并对结果进行分析。 展开更多
关键词 wireshark抓包工具 EAP-TTLS协议 网络访问层 双向认证
下载PDF
Intrusion detection systems for wireless sensor networks using computational intelligence techniques
3
作者 Vaishnavi Sivagaminathan Manmohan Sharma Santosh Kumar Henge 《Cybersecurity》 EI CSCD 2024年第2期81-95,共15页
Network Intrusion Detection Systems(NIDS)are utilized to find hostile network connections.This can be accom-plished by looking at traffic network activity,but it takes a lot of work.The NIDS heavily utilizes approache... Network Intrusion Detection Systems(NIDS)are utilized to find hostile network connections.This can be accom-plished by looking at traffic network activity,but it takes a lot of work.The NIDS heavily utilizes approaches for data extraction and machine learning to find anomalies.In terms of feature selection,NIDS is far more effective.This is accurate since anomaly identification uses a number of time-consuming features.Because of this,the feature selec-tion method influences how long it takes to analyze movement patterns and how clear it is.The goal of the study is to provide NIDS with an attribute selection approach.PSO has been used for that purpose.The Network Intrusion Detection System that is being developed will be able to identify any malicious activity in the network or any unusual behavior in the network,allowing the identification of the illegal activities and safeguarding the enormous amounts of confidential data belonging to the customers from being compromised.In the research,datasets were produced utilising both a network infrastructure and a simulation network.Wireshark is used to gather data packets whereas Cisco Packet Tracer is used to build a network in a simulated environment.Additionally,a physical network consisting of six node MCUs connected to a laptop and a mobile hotspot,has been built and communication packets are being recorded using the Wireshark tool.To train several machine learning models,all the datasets that were gatheredcre-ated datasets from our own studies as well as some common datasets like NSDL and UNSW acquired from Kaggle-were employed.Additionally,PsO,which is an optimization method,has been used with these ML algorithms for feature selection.In the research,KNN,decision trees,and ANN have all been combined with PSO for a specific case study.And it was found demonstrated the classification methods PSO+ANN outperformed PSO+KNN and PSO+DT in this case study. 展开更多
关键词 Network intrusion detection systems(NIDS) Cisco packet tracer wireshark tool Machine learning PSO CYBERSECURITY Optimization
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部