首页> 外文学位 >Creating models of Internet background traffic suitable for use in evaluating network intrusion detection systems.
【24h】

Creating models of Internet background traffic suitable for use in evaluating network intrusion detection systems.

机译:创建适用于评估网络入侵检测系统的Internet背景流量模型。

获取原文
获取原文并翻译 | 示例

摘要

This dissertation addresses Internet background traffic generation and network intrusion detection. It is organized in two parts. Part one introduces a method to model realistic Internet background traffic and demonstrates how the models are used both in a simulation environment and in a lab environment. Part two introduces two different NID (Network Intrusion Detection) techniques and evaluates them using the modeled background traffic.; To demonstrate the approach we modeled five major application layer protocols: HTTP, FTP, SSH, SMTP and POP3. The model of each protocol includes an empirical probability distribution plus estimates of application-specific parameters. Due to the complexity of the traffic, hybrid distributions (called mixture distributions) were sometimes required. The traffic models are demonstrated in two environments: NS-2 (a simulator) and HONEST (a lab environment). The simulation results are compared against the original captured data sets. Users of HONEST have the option of adding network attacks to the background.; The dissertation also introduces two new template-based techniques for network intrusion detection. One is based on a template of autocorrelations of the investigated traffic, while the other uses a template of correlation integrals. Detection experiments have been performed on real traffic and attacks; the results show that the two techniques can achieve high detection probability and low false alarm in certain instances.
机译:本文主要研究Internet后台流量的产生和网络入侵检测。它分为两个部分。第一部分介绍了一种对现实的Internet背景流量建模的方法,并演示了如何在仿真环境和实验室环境中使用这些模型。第二部分介绍了两种不同的NID(网络入侵检测)技术,并使用建模的背景流量对其进行了评估。为了演示该方法,我们对五个主要的应用程序层协议进行了建模:HTTP,FTP,SSH,SMTP和POP3。每个协议的模型都包括经验概率分布以及特定于应用程序的参数的估计。由于交通的复杂性,有时需要混合分布(称为混合分布)。在两种环境中演示了流量模型:NS-2(模拟器)和HONEST(实验室环境)。将模拟结果与原始捕获的数据集进行比较。 HONEST的用户可以选择将网络攻击添加到后台。本文还介绍了两种新的基于模板的网络入侵检测技术。一种基于调查流量的自相关模板,另一种基于相关积分模板。已经对实际流量和攻击进行了检测实验;结果表明,在某些情况下,这两种技术可以实现较高的检测概率和较低的误报率。

著录项

  • 作者

    Luo, Song.;

  • 作者单位

    University of Central Florida.;

  • 授予单位 University of Central Florida.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2005
  • 页码 173 p.
  • 总页数 173
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号