Security Evaluation of Hosts Based on Network Traffic

被引:0
|
作者
Gao, Cuixia [1 ]
Li, Zhitang [1 ]
Chen, Lin [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
关键词
security evaluation; network traffic;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Malicious behavior will lead to abnormal network traffic patterns. This paper presents a network traffic based method to evaluate the security situation of hosts. A group of variables that can reflect the network traffic feature in a fixed time window are selected as the evaluation metrics. Based on the large samples, we report on a preliminary proof-of-concept approach, that's logistic regression Analysis, to evaluate the probability of host that run into insecure status. The evaluation results are regarded as the normalized abnormality value to evaluate the network traffic of hosts. Experiments and testing show that this method can reasonably evaluate the host network abnormal traffic.
引用
收藏
页码:901 / 905
页数:5
相关论文
共 50 条
  • [41] Network Traffic and Security Event Collecting System
    Son, Hee-Seung
    Lee, Jin-Heung
    Kim, Tae-Yong
    Lee, Sang-Gon
    [J]. PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL SYSTEMS, TECHNOLOGY AND INFORMATION 2015 (ICESTI 2015), 2016, 365 : 439 - 446
  • [42] Network traffic analysis and security monitoring with UniMon
    Erhard, W
    Gutzmann, MM
    Libati, HM
    [J]. ATM 2000: PROCEEDINGS OF THE IEEE CONFERENCE 2000 ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2000, : 439 - 446
  • [43] Generating realistic network traffic for security experiments
    Luo, S
    Marin, GA
    [J]. PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: ENGINEERING CONNECTS, 2004, : 200 - 207
  • [44] Road Network Traffic Congestion Evaluation Simulation Model based on Complex Network
    Luo, Chao
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 2107 - 2112
  • [45] Cache-based network processor architecture: Evaluation with real network traffic
    Okuwo, Michitaka
    Nishimura, Shinji
    Ishida, Shin-ichi
    Nishi, Hiroaki
    [J]. IEICE TRANSACTIONS ON ELECTRONICS, 2006, E89C (11): : 1620 - 1628
  • [46] FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS CORRELATION WITH NETWORK SECURITY
    Ding, Caichang
    Chen, Yiqin
    Liu, Zhiyuan
    Alshehri, Ahmed Mohammed
    Liu, Tianyin
    [J]. FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY, 2022, 30 (02)
  • [47] Classification of Network Traffic Using Fuzzy Clustering for Network Security
    Fries, Terrence P.
    [J]. ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS, ICDM 2017, 2017, 10357 : 278 - 285
  • [48] A Survey of Network Traffic Visualization in Detecting Network Security Threats
    Liu, Xiaomei
    Sun, Yong
    Fang, Liang
    Liu, Junpeng
    Yu, Lingjing
    [J]. TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 91 - 98
  • [49] Recognition Method and Evaluation of Traffic Signs Based on Capsule Network
    Qu, Zhihua
    Shao, Yiming
    [J]. CICTP 2020: TRANSPORTATION EVOLUTION IMPACTING FUTURE MOBILITY, 2020, : 376 - 388
  • [50] On Performance Evaluation of Various Traffic Combination based on Network Calculus
    Gao, Yangyang
    Song, Fei
    Qin, Yajuan
    You, Ilsun
    [J]. 2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 381 - 386