期刊文献+

基于余弦测度下K-means的网络空间终端设备识别 被引量:9

Cyberspace device identification based on K-means with cosine distance measure
在线阅读 下载PDF
导出
摘要 针对传统Web指纹识别方法中识别对象局限于主流Web服务器软件的问题,提出一种基于余弦测度下K-means的网络空间终端设备识别模型.首先,设计识别模型和确定验证方法.其次,选取返回的HTTP数据包头部字段和状态码作为终端设备特征,对特征进行提取和向量化后转化为32维特征向量.再次,选取余弦距离函数作为K-means聚类算法中的相似性度量函数.最后,根据识别模型设计实验算法流程,对网络空间中的无标记样本和标记样本进行识别实验.实验结果表明,该模型能够识别无线路由器、网络摄像头和智能交换机等终端设备,并具有较高的识别准确率和较低的识别遗漏率. Since the traditional web fingerprinting methods are limited to identification of mainstream web server softwares,a kind of cyberspace device identification model based on K-means with cosine distance measure is proposed. Firstly,identification model is designed and verification method is determined. Secondly,the header fields and the status code of HTTP response are selected as characteristics of terminal device and then the characteristics are transformed into 32-dimensional feature vector by feature extraction and vectorization. Thirdly,cosine distance function is selected as similarity measuring function in K-means. Finally,experiment algorithm process is designed according to the identification model and the experiments for unlabeled samples and labeledsamples are carried out. The results show that the identification model works for many kinds of terminal devices,including wireless router,web camera,and intelligent switch,and has high accuracy rate and low omission rate.
出处 《中国科学院大学学报(中英文)》 CSCD 北大核心 2016年第4期562-569,共8页 Journal of University of Chinese Academy of Sciences
基金 国家自然科学基金(61562059 61461027)资助
关键词 网络空间 终端设备 K-MEANS 余弦测度 指纹识别 cyberspace terminal device K-means cosine measure fingerprinting
作者简介 通信作者,E-mail:zhaojianjun@hotmail.com
  • 相关文献

参考文献13

  • 1ZoomEye.网络设备统计分析[EB/OL].(2015-12-31)[2015-12-31].https://WWW.zoomeye.org/statistic/device.
  • 2Gallagher S. Backdoor in wireless DSL routers lets attacker reset router, get admin [ EB/OLI. (2014-01-03) [ 2015-12- 31 ]. http : /'/' arstechnica, com/security/2014/O1/backdoor-in- wireless-dsl-routers-lets-attacker-reset-router-get-admin/.
  • 3Chirgwin R. Hacker backdoors Linksys, Netgear, Cisco and otheh routers [ EB/OL]. (2014-01-06) [2015-12-31 ]. http:// www. theregister, co. uk/2014/01/06/hacker_ backdoors_ linksys_netgear_cisco_and_other_routers/.
  • 4国家互联网应急中心.关于多款D-LINK路由器产品存在后门漏洞的情况通报[EB/OL].(2013-10-25)[2015-12-31].http://WWW.celt.org.cn/publish/main/9/2013/20131025152943288740930/20131025152943288740930_.html.
  • 5Singh D, Sinha R, Songara P, et al. Vulnerabilities and attacks targeting social networks and industrial control systems [J]. Eprint Arxiv, 2014, 4(1) :133-142.
  • 6彭勇,江常青,谢丰,戴忠华,熊琦,高洋.工业控制系统信息安全研究进展[J].清华大学学报(自然科学版),2012,52(10):1396-1408. 被引量:183
  • 7Shah S. An introduction to HTTP fingerprinting [ EB/OL]. (2004-05-19) [ 2015-12-31 ]. http:// net-square. com/ httprint_paper, html.
  • 8Lee D, Rowe J, Ko C, et al. Detecting and defending against Web-server fingerprinting [ C ]//CSAC 2002 : 2002 Computer Security Applications Conference. United States: IEEE Computer Society, 2002 : 321-330.
  • 9杨可新,鞠九滨.利用Web指纹进行服务映射[J].计算机工程与应用,2004,40(4):7-9. 被引量:3
  • 10Fyodor. Remote OS detection via TCP/IP stack fingerprinting [J]. Phrack Magazine, 1998, 17(3): 1-10.

二级参考文献160

共引文献235

同被引文献16

引证文献9

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部