登录    注册    忘记密码

详细信息

Combining Renyi Entropy and EWMA to Detect Common Attacks in Network  ( SCI-EXPANDED收录 EI收录)  

文献类型:期刊文献

英文题名:Combining Renyi Entropy and EWMA to Detect Common Attacks in Network

作者:Yan, Ruoyu[1]

第一作者:颜若愚

通讯作者:Yan, RY[1]

机构:[1]Henan Univ Econ & Law, Coll Comp & Informat Engn, Zhengzhou 450002, Henan Province, Peoples R China

第一机构:河南财经政法大学计算机与信息工程学院

通讯机构:[1]corresponding author), Henan Univ Econ & Law, Coll Comp & Informat Engn, Zhengzhou 450002, Henan Province, Peoples R China.|[1048412]河南财经政法大学计算机与信息工程学院;[10484]河南财经政法大学;

年份:2016

卷号:30

期号:10

外文期刊名:INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE

收录:;EI(收录号:20162402499201);Scopus(收录号:2-s2.0-84973664363);WOS:【SCI-EXPANDED(收录号:WOS:000389252400002)】;

基金:This work is supported mainly by Henan Joint Funds of the National Natural Science Foundation of China (Grant No. U1404605), National Natural Science Foundation of China (Grant Nos. 61502393 and 61373120), and Henan Provincial Natural Science Research Program Foundation of Henan Educational Committee (Grant No. 13B520901).

语种:英文

外文关键词:Renyi entropy; traffic feature selection; control chart theory; network attack identification

摘要:How to timely and precisely identify attack behaviors in network without dealing with a large number of traffic features and historical data, such as training data, is an important research work in the field of network security. In this paper,firstly, the differences between Renyi entropy and Shannon entropy are analyzed and compared. In order to capture network traffic changes exactly, Renyi entropy instead of Shannon entropy is proposed to measure selected traffic features. Then EWMA control chart theory is used to check Renyi entropy time series for detecting and screening anomalies. And three kinds of network attacks are also analyzed and characterized by behavior feature vector for attack identification. Finally a feature similarity based method is used to identify attacks. The experimental results of real traffic traces show that the proposed method has good capability to detect and identify these attacks with less computation cost. To evaluate attack identification method conveniently, an approach is proposed to generate simulated attack traffics. Compared with Shannon entropy-based method, the experiments on simulation traffics show that Renyi entropy-based method has much higher overall accuracy, average precision and average true positive rate. Further comparison indicates the proposed method has more powerful performance to detect attacks than PCA-based method.

参考文献:

正在载入数据...

版权所有©河南财经政法大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心