网络恶意流量检测与分类方法研究

第1页 / 共19页

第2页 / 共19页

第3页 / 共19页

第4页 / 共19页

第5页 / 共19页

第6页 / 共19页

第7页 / 共19页

第8页 / 共19页
试读已结束,还剩11页,您可下载完整版后进行离线阅读
网络恶意流量检测与分类方法研究-知知文库网
网络恶意流量检测与分类方法研究
此内容为付费资源,请付费后查看
10
限时特惠
20
立即购买
您当前未登录!建议登陆后购买,可保存购买订单
付费资源
© 版权声明
THE END
网络恶意流量检测与分类方法研究Absrtact:The classification and detection technology of network abnormal traffic is animportant technology in network operation and maintenance management.Therefore,it hasattracted extensive attention of network security researchers,and has proposed a feasibleclassification and detection method for abnormal traffic.In recent years,deteriorating networksecurity incidents have promoted the continuous progress of network anomaly traffic classificationand detection technology,and new technologies have been proposed continuously.However,withthe continuous construction and use of networks with larger and larger scale and more and morecomplex topological structures,the traditional network anomaly traffic detection method based onport or traffic feature statistics can no longer meet the impact of super-large traffic data flow,norcan it meet the real-time detection requirements of current time complexity.The main timeconsumption of network abnormal traffic detection is concentrated on the pretreatment of networktraffic data and the establishment of rule sets.Therefore,the key to solve the bottleneck of large-scale network abnormal traffic classification detection technology lies in the data pretreatment andthe establishment of rule sets.On the basis of studying granularity representation,extraction ofcharacteristic parameters of abnormal network traffic and big data technology,a classification anddetection method of abnormal network traffic based on behavior analysis is proposed.This methodcombines machine learning algorithm and big data processing tools on the basis of network trafficbehavior analysis,and effectively reduces the time consumption of detection algorithm in theprocess of data preprocessing and rule set establishment on the basis of ensuring real-time detection.The simulation results show that the method not only performs well in the classification anddetection of abnormal network traffic,but also has the ability to collect unknown attacks,which caneffectively ensure the smooth and normal operation of the network.Key words:behavior analysis,malicious traffic detection,big data2
喜欢就支持一下吧
点赞7 分享
评论 抢沙发
头像
欢迎您留下宝贵的见解!
提交
头像

昵称

取消
昵称表情代码图片

    暂无评论内容