登录    注册    忘记密码

详细信息

网络抖动下疑似攻击流指纹有效监测方法研究    

Study on Effective Monitoring Method for Suspected Attack Flow Fingerprint under Network Jitter

文献类型:期刊文献

中文题名:网络抖动下疑似攻击流指纹有效监测方法研究

英文题名:Study on Effective Monitoring Method for Suspected Attack Flow Fingerprint under Network Jitter

作者:袁开银[1];王峰[1]

第一作者:袁开银

机构:[1]河南财经政法大学

第一机构:河南财经政法大学

年份:2016

卷号:0

期号:3

起止页码:424-427

中文期刊名:计算机仿真

外文期刊名:Computer Simulation

收录:CSTPCD;;北大核心:【北大核心2014】;CSCD:【CSCD_E2015_2016】;

基金:自然科学基金(60972082)

语种:中文

中文关键词:网络抖动;攻击流指纹;监测;模糊粗糙集算法

外文关键词:Network jitter; Attack flow fingerprint; Monitoring; Fuzzy rough set algorithm

摘要:研究网络抖动下疑似攻击流指纹的有效监测时,由于攻击流指纹的隐蔽性及网络数据量大的特性,会出现网络噪声干扰。传统的方法受到这种干扰无法保证监测的实时性与监测结果的准确性。提出基于模糊粗糙集算法的网络抖动下疑似攻击流指纹的监测方法。针对原始监测数据的信息冗余、数据矛盾等问题,进行数据离散化及信息约简预处理,根据模糊粗糙集原理,分别经由数据准备、节点衍生、规则集生成及结果判定的过程,实现对监测数据的有效分类,从而完成对疑似攻击流指纹的有效识别判定。实验结果表明,采用改进算法进行网络抖动下疑似攻击流指纹监测,可以提高监测结果的准确度,减小误报率与漏报率,节约监测成本,具有实际的应用价值。
A monitoring method suspected attack flow fingerprint under the network jitter was proposed based on fuzzy rough set algorithm. Aiming at the problem of information redundancy and data contradiction of the original mo- nitoring data, data discretization and information reduction pretreatment were carried out. According to the theory of fuzzy rough set, the effective classification of the monitoring data was realized through data preparation, node deriva- tion, rule set generation and result determination process, thus completing the effective judgement and identification of the suspected attack flow fingerprint. Experimental results show that using the improved algorithm for monitoring the suspected attack flow fingerprint under network jitter, can increase the accuracy of monitoring results, reduce the false alarm rate and missing report rate, and save the cost of monitoring, which has the actual application value.

参考文献:

正在载入数据...

版权所有©河南财经政法大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心