An Intrusion Alarming System Based on Self-Similarity of Network Traffic

被引:2
|
作者
YU Fei 1
2. Computer and Communication Institute
机构
关键词
intrusion detection; self-similarity; network traffic model; network processor;
D O I
暂无
中图分类号
TP393 [计算机网络];
学科分类号
081201 ; 1201 ;
摘要
Intrusion detection system can make effective alarm for illegality of network users, which is absolutely necessarily and important to build security environment of communication base service. According to the principle that the number of network traffic can affect the degree of self-similar traffic, the paper investigates the variety of self-similarity resulted from unconventional network traffic. A network traffic model based on normal behaviors of user is proposed and the Hurst parameter of this model can be calculated. By comparing the Hurst parameter of normal traffic and the self-similar parameter, we can judge whether the network is normal or not and alarm in time.
引用
收藏
页码:169 / 173
页数:5
相关论文
共 50 条
  • [1] Self-similarity of network traffic
    [J]. 2000, Journal of Nanjing Institute of Posts and Telecommunications, China (20):
  • [2] Network Traffic Detection Based on Histogram and Self-similarity Matrix
    Yang, Penglin
    Tao, Limin
    Wang, Haitao
    [J]. PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEM (ICISS 2018), 2018, : 207 - 209
  • [3] On the effect of traffic self-similarity on network performance
    Park, KH
    Kim, GT
    Crovella, M
    [J]. PERFORMANCE AND CONTROL OF NETWORK SYSTEMS, 1997, 3231 : 296 - 310
  • [4] Research on Self-Similarity Network Traffic Modeling
    Zhang, Yu
    Yin, Tengfei
    [J]. MECHANICAL AND AEROSPACE ENGINEERING, PTS 1-7, 2012, 110-116 : 2859 - +
  • [5] Effect of TCP on self-similarity of network traffic
    Wisitpongphan, N
    Peha, JM
    [J]. ICCCN 2003: 12TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2003, : 370 - 373
  • [6] On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems
    Allen, WH
    Marin, GA
    [J]. 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2003, : 242 - 248
  • [7] Self-similarity Analysis and Application of Network Traffic
    Xu, Yan
    Li, Qianmu
    Meng, Shunmei
    [J]. MOBILE COMPUTING, APPLICATIONS, AND SERVICES, MOBICASE 2019, 2019, 290 : 112 - 125
  • [8] Improved R/S algorithm based on network traffic self-similarity
    Zhang Dengyin
    Liu Yu
    Anant Adi
    Li Haibo
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12600 - +
  • [9] Network Traffic Anomaly Detection Based on Self-similarity Using FRFT
    Ye, Xiaolong
    Lan, Julong
    Huang, Wanwei
    [J]. PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 837 - 840
  • [10] Self-similarity Analysis and Application of Water Network Traffic
    Xu, Yan
    Shamrooz, Summera
    Li, Qianmu
    Hou, Jun
    [J]. 2019 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2019), 2019, : 257 - 261