首页 | 本学科首页   官方微博 | 高级检索  
     

An Intrusion Alarming System Based on Self-Similarity of Network Traffic
引用本文:YUFei ZHUMiao-liang CHENYu-feng LIRen-fa XUCheng. An Intrusion Alarming System Based on Self-Similarity of Network Traffic[J]. 武汉大学学报:自然科学英文版, 2005, 10(1): 169-173. DOI: 10.1007/BF02828642
作者姓名:YUFei ZHUMiao-liang CHENYu-feng LIRen-fa XUCheng
作者单位:[1]ArtificialIntelligenceInstitute,ZhejiangUniversity,Hangzhou310027,Zhejiang,China//CompulerandCommunicationInstitute,HunanUniversity,Changsha410082,HunanChina [2]ArtificialIntelligenceInstitute,ZhejiangUniversity,Hangzhou310027,Zhejiang,China [3]CompulerandCommunicationInstitute,HunanUniversity,Changsha410082,HunanChina
基金项目:SupportedbytheNaturalScienceFoundationofHunanProvince(03JJY3103)
摘    要:Intrusion detection system can make effective alarm for illegality of network users, which is absolutely necessarily and important to build security environment of communication base service. According to the principle that the number of network traffic can affect the degree of self-similar traffic, the paper investigates the variety of self-similarity resulted from unconventional network traffic. A network traffic model based on normal behaviors of user is proposed and the Hurst parameter of this model can be calculated. By comparing the Hurst parameter of normal traffic and the self-similar parameter, we can judge whether the network is normal or not and alarm in time.

关 键 词:入侵检测 网络处理器 自相似流能量 网络流通量 计算机网络安全
收稿时间:2004-05-20

An intrusion alarming system based on self-similarity of network traffic
Yu Fei,Zhu Miao-liang,Chen Yu-feng,Li Ren-fa,Xu Cheng. An intrusion alarming system based on self-similarity of network traffic[J]. Wuhan University Journal of Natural Sciences, 2005, 10(1): 169-173. DOI: 10.1007/BF02828642
Authors:Yu Fei  Zhu Miao-liang  Chen Yu-feng  Li Ren-fa  Xu Cheng
Affiliation:(1) Artifioial Intelligence Institute, Zhejiang University, 310027, Zhejiang Hangzhou, China;(2) Computer and Communication Institute, Hunan University, 410082, Hunan Changsha, China
Abstract:Intrusion detection system can make effective alarm for illegality of network users, which is absolutely necessarily and important to build security environment of communication base service. According to the principle that the number of network traffic can affect the degree of self-similar traffic, the paper investigates the variety of self-similarity resulted from unconventional network traffic. A network traffic model based on normal behaviors of user is proposed and the Hurst parameter of this model can be calculated. By comparing the Hurst parameter of normal traffic and the self-similar parameter, we can judge whether the network is normal or not and alarm in time.
Keywords:intrusion detection  self-similarity  network traffic model  network processor
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号