首页 | 本学科首页   官方微博 | 高级检索  
     检索      

面向蓄意攻击的网络异常检测方法
引用本文:赵海,郑春阳,王进法,司帅宗.面向蓄意攻击的网络异常检测方法[J].东北大学学报(自然科学版),2020,41(10):1376-1381.
作者姓名:赵海  郑春阳  王进法  司帅宗
作者单位:(1. 东北大学 计算机科学与工程学院, 辽宁 沈阳110169; 2. 中国科学院 信息工程研究所/物联网安全北京市重点实验室, 北京100093)
基金项目:中央高校基本科研业务费专项资金资助项目(2020GFZD014).
摘    要:针对复杂网络受蓄意攻击频繁,而现有的检测方法大多忽略全局拓扑突变特征的问题.从网络全局拓扑的异常演化特征出发,提出网络路径相对变化系数(network path change coefficient,NPCC)r,量化节点间传输路径的变化.由斐波那契数列衍生出斐波那契演化域,用于区分正常和异常演化.将r作为核心度量参量,构建斐波那契演化域,形成网络异常检测方法,实现对异常的判定.结果表明,该检测方法的平均准确率为90%以上,高于最大公共子图(maximum common subgraph,MCS)及图编辑距离(graph edit distance,GED)的准确率,证明了所提检测方法的有效性.

关 键 词:网络异常检测  斐波那契演化域  路径变化系数  蓄意攻击  网络科学  
收稿时间:2019-07-18
修稿时间:2019-07-18

Network Anomaly Detection Method for Intentional Attack
ZHAO Hai,ZHENG Chun-yang,WANG Jin-fa,SI Shuai-zong.Network Anomaly Detection Method for Intentional Attack[J].Journal of Northeastern University(Natural Science),2020,41(10):1376-1381.
Authors:ZHAO Hai  ZHENG Chun-yang  WANG Jin-fa  SI Shuai-zong
Institution:1. School of Computer Science & Engineering,Northeastern University,Shenyang 110169,China; 2. Beijing Key Laboratory of IoT Information Security Technology/Institute of Information Engineering, CAS, Beijing 100093, China.
Abstract:The anomaly triggered by intentional attack in complex networks is common but most existing detection methods ignore the global topology mutation feature. To solve this problem, based on the abnormal evolution characteristics of the global network topology, a network path change coefficient (r) was proposed to quantify the change of the transmission path between nodes. The Fibonacci evolution region was derived from the Fibonacci sequence to distinguish normal and abnormal evolution. r was used as the core measurement parameter to construct the Fibonacci evolution region, form a network anomaly detection method, and realize the determination of anomalies. The results showed that the average accuracy of the detection method is more than 90%, which is higher than the accuracies of MCS (maximum common subgraph) and GED (graph edit distance), which proves the effectiveness of the proposed detection method.
Keywords:network anomaly detection  Fibonacci evolution region  path change coefficient (r)  intentional attack  network science  
点击此处可从《东北大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《东北大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号