Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of University of Electronic Science and Technology of China》 2017-01
Add to Favorite Get Latest Update

Profiling Structure-Stability-Based Server Traffic: Behavior Models and System

SHAO Guo-lin;CHEN Xing-shu;YIN Xue-yuan;YE Xiao-ming;College of Computer Science,Sichuan University;  
Server as an important part of the institutions or organizations usually carries a particular network service, for the security protection, it usually adopts rule-based approaches to detecting attacks according to the specific characters. However, due to the new network attacks emerge in endlessly and network anomaly is difficult to define, anomaly-feature-based detection is more and more difficult to meet the needs of the increasingly complex network environment. To cope with it, we propose the concept of traffic structure stability based on both the inherent stability of normal traffic attributes and the stability of a specific service, and profile the normal network behavior model for the server to detect traffic abnormality. To describe the difference between current traffic structure and the normal profile, we propose a novel visualization measurement method based on Spie Chart. Finally, we implement the system on a mail server and confirm the validity of the model by experiments.
【Fund】: 国家自然科学基金(61272447);; 国家科技支撑计划(2012BAH18B05)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 10 Hits
1 HE Peng-cheng;FANG Yong;College of Electronics and Information Engineering,Sichuan University;;A Risk Assessment Model of Intrusion Detection for Web Applications Based on Web Server Logs and Website Parameters[J];信息网络安全;2015-01
2 ZHANG Feng-li;ZHAO Yong-liang;WANG Dan;WANG Hao;School of Computer Science & Engineering,University of Electronic Science and Technology of China;;Prediction of Network Traffic Based on Traffic Characteristics[J];计算机科学;2014-04
3 WANG Hui-xia,CHENG Guo-yong,HAN Yong-fei(Department of Computer Science and Technology,Beijing University of Technology,Beijing,100124 China);Research on Increasing Speed of Rule-matching in Snort[J];电脑与信息技术;2013-01
4 LEI Jing-peng1,2,YAN Shi-bo2(1.College of Computer and Information,HeFei University of Technology,Hefei Anhui 230002,China; 2.Department of Information Engineering,Anhui Vocational College of Defense Technology,Lu'an Anhui 237011,China);Host Intrusion Detection Based on Windows Log[J];吉林工程技术师范学院学报;2013-01
5 ZHOU Li,WANG Xiao-ling(College of Information Science and Engineering,Central South University,Changsha 410083,China);Improved Algorithm for Association Rules Mining Based on Network Audit Record[J];计算机技术与发展;2011-06
6 ZHENG Li-liang,WU Guo-feng,HU Xiao-ming,LIU Qing-yu,LIN Jie-hua(School of Computer and Information,Hefei University of Technology,Hefei 230009,China);Research on intrusion detection system based on Snort and its improvement[J];合肥工业大学学报(自然科学版);2011-04
7 JIA Hui,GAO Zhong-he(Qufu Normal University,Rizhao Shandong 276826,China);Anomalous-traffic Detection Model based on Self-similarity[J];通信技术;2010-12
8 DU Xin, YANG Ying-jie, CHANG De-xian (Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004);Network Traffic Supervision System Based on Feature Distribution Analysis[J];计算机工程;2009-06
9 CHENG Bai-liang1,ZHOU Hong-bo2,ZHONG Lin-hui1(1.School of Computer Information Engineering,Jiangxi Normal University,Nanchang 330022,China;2.Nanchang Command School,Armied Policeforces College,Nanchang 330100,China);Intrusion detection system based on anomaly and misuse[J];计算机工程与设计;2007-14
10 GAO Neng FENG Deng-Guo XIANG Ji(State Key Laboratory of Information Security,Graduate University of Chinese Academy of Sciences,Beijing 100049);A Data-Mining Based DoS Detection Technique[J];计算机学报;2006-06
【Co-citations】
Chinese Journal Full-text Database 9 Hits
1 SHAO Guo-lin;CHEN Xing-shu;YIN Xue-yuan;YE Xiao-ming;College of Computer Science,Sichuan University;;Profiling Structure-Stability-Based Server Traffic: Behavior Models and System[J];电子科技大学学报;2017-01
2 JI Yuxiang;ZHU Yan;TANG Xiaoqiang;State Grid Jibei Electric Power Company Limited Skills Training Center;;Security Analysis of Web Based Software[J];信息网络安全;2016-09
3 HUANG Yu;HOU Zhengfeng;YU Hu;LIU Chunhui;School of Computer and Information,Hefei University of Technology;;A Chinese multi-pattern matching algorithm based on the characteristic of Chinese character coding[J];合肥工业大学学报(自然科学版);2016-08
4 WANG Jie;School of Information & Engineering ,Guangdong Open University;;Design and implementation of invasion risk assessment module based on Android smart phone[J];现代电子技术;2016-16
5 FAN Jin-lu;CHEN Chang-qing;Zhengzhou University of Industrial Technology;;Fault tolerant routing mechanism of wireless sensor in metal mining[J];世界有色金属;2016-10
6 WU Xiaoping;ZHOU Zhou;LI Hongcheng;Department of Information Security, Naval University of Engineering;;Research and Implementation on Network Traffic Anomaly Detection without Guidance Learning with Spark[J];信息网络安全;2016-06
7 MAO Yanying;LUO Senlin;Information System and Security & Countermeasures Experimental Center, Beijing Institute of Technology;;Research on Heap Spray for Integration of Multiple Technologies[J];信息网络安全;2016-06
8 SHI Guozhen;ZHANG Meng;FU Peng;SU Mang;Beijing Electronic Science & Technology Institute;IT Academy, Xidian University;IT Academy, Nanjing University of Science and Technology;;Design and Implementation of IDS Device Detection Tool[J];信息网络安全;2016-05
9 WEI Kun-peng;GE Zhi-hui;YANG Bo;College of Computer and Electronic Information, Guangxi University;China Telecom Group System Integration Limited Liability Company;;Research on Attack-defense of PHP Web Application Upload Vulnerability[J];信息网络安全;2015-10
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 YAO Dong;LUO Jun-yong;CHEN Wu-ping;YIN Mei-juan;PLA Information Engineering University;Science and Technology on Information Assurance Laboratory;State Key Laboratory of Mathematical Engineering and Advanced Computing;;Online Double Random Forests Intrusion Detection Based on Non-extensive Entropy Features Extraction[J];计算机科学;2013-12
2 MA Li1 ZHANG Gao-ming2 GOU Juan-ying3(Information Center,Xi'an University of Posts and Telecommunications,Xi'an 710061,China)1(School of Computer Science & Technology,Xi'an University of Posts and Telecommunications,Xi'an 710061,China)2(Xi'an Space Engine Factory,Xi'an 710100,China)3;Method Research for Campus Network Traffic Prediction Based on Wavelet Transform[J];计算机科学;2012-S2
3 Li Jun (Shantou Economic Trade Secondary Vocational and Technical School GuangdongShantou 515041);Intrusion Detection Technology Application in Network Security based on outlier Mining Technology[J];信息安全与技术;2012-07
4 Ren Rong, Wang Guoren, Sun Jianlin;Application of Ping and Tracert in Railway Network[J];铁道通信信号;2012-05
5 GAO Qian FENG Qi LI Guang-xia (Institute of Communication Engineering,PLA University of Science & Technology,Nanjing 210007,China);Combination Model-based Self-similarity Traffic Prediction[J];计算机科学;2012-04
6 YANG Fu-hua;Web log mining of research and analysis[J];制造业自动化;2011-06
7 LIANG Ping,SHUAI Jian-mei,TAN Xiao-bin,ZHOU Yu(School of Information Science and Technology,University of Science and Technology of China,Hefei 230027,China);Method for Snort Rule Set Optimal Construction Based on Decision Tree[J];计算机工程;2011-02
8 LIU Qing-yu,YE Zhen,YIN Cai-rong(School of Computer and Information,Hefei University of Technology,Hefei 230009,China);A network intrusion detection method based on description of attack characteristics[J];合肥工业大学学报(自然科学版);2010-02
9 CHENG Yu-qing,MEI Deng-hua,CHEN Long-fei(School of Computer Science and Engineering,South China Universityof Technology,Guangzhou 510006,China);A Model of Intrusion Detection System Based on Data Mining[J];计算机技术与发展;2009-12
10 JIANG Ming1,WU Chun-ming2,ZHANG Min1,HU Da-min2(1.Institute of Software and Intelligent Technology,Hangzhou Dianzi University,Hangzhou,Zhejiang 310018,China;2.AI Institute of Zhejiang University,Hangzhou,Zhejiang 310027,China);Research on the Comparison of Time Series Models for Network Traffic Prediction[J];电子学报;2009-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved