期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于孤立森林算法的铁路通信网潜在攻击检测方法研究 被引量:1
1
作者 董玉圻 《铁道通信信号》 2023年第7期54-59,共6页
针对当前铁路通信网潜在攻击检测方法在识别异常攻击时忽略了对数据的降维处理,导致检测效率偏低、误报率和漏检率较高等问题,提出基于孤立森林算法的铁路通信网潜在攻击检测方法。将铁路通信网样本集通过数据类型划分为多个子集,通过... 针对当前铁路通信网潜在攻击检测方法在识别异常攻击时忽略了对数据的降维处理,导致检测效率偏低、误报率和漏检率较高等问题,提出基于孤立森林算法的铁路通信网潜在攻击检测方法。将铁路通信网样本集通过数据类型划分为多个子集,通过对主成分进行分析,最大限度地减少不同子集间的降维影响,使各子集降维达到最佳;基于降维处理的数据,构建孤立森林潜在攻击检测器,判断数据异常行为;基于孤立森林算法更新铁路通信网潜在攻击检测器,实现铁路通信网潜在攻击检测。仿真试验结果:测试样本数量增加时,该算法的检测速率保持在90%以上,误报率和漏检率均小于等于0.02%,表明该方法在铁路通信网潜在攻击检测上具有一定的应用价值。 展开更多
关键词 铁路通信网 孤立森林算法 潜在攻击 主成分分析法 攻击检测器
在线阅读 下载PDF
HTTP-sCAN:Detecting HTTP-Flooding Attack by Modeling Multi-Features of Web Browsing Behavior from Noisy Web-Logs 被引量:3
2
作者 WANG Jin ZHANG Min +2 位作者 YANG Xiaolong LONG Keping XU Jie 《China Communications》 SCIE CSCD 2015年第2期118-128,共11页
HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by ... HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks. 展开更多
关键词 IP network DDoS relative entropy cluster algorithm
在线阅读 下载PDF
Managing High Volume Data for Network Attack Detection Using Real-Time Flow Filtering
3
作者 Abhrajit Ghosh Yitzchak M. Gottlieb +5 位作者 Aditya Naidu Akshay Vashist Alexander Poylisher Ayumu Kubota Yukiko Sawaya Akira Yamada 《China Communications》 SCIE CSCD 2013年第3期56-66,共11页
In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to hi... In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to high volume data feeds that are common in large Tier-1 ISP networks and providing rich, timely information on observed attacks. It is a software solution that is designed to run on off-the-shelf hardware platforms and incorporates a scalable data processing architecture along with lightweight analysis algorithms that make it suitable for deployment in large networks. RTFF also makes use of state of the art machine learning algorithms to construct attack models that can be used to detect as well as predict attacks. 展开更多
关键词 network security intrusion detection SCALING
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部