首页> 外文期刊>Computer Communications >Filtration model for the detection of malicious traffic in large-scale networks
【24h】

Filtration model for the detection of malicious traffic in large-scale networks

机译:大规模网络中恶意流量检测的过滤模型

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

This study proposes a capable, scalable, and reliable edge-to-edge model for filtering malicious traffic through real-time monitoring of the impact of user behavior on quality of service (QoS) regulations. The model investigates user traffic, including that injected through distributed gateways and that destined to gateways that are experiencing actual attacks. Misbehaving traffic filtration is triggered only when the network is congested, at which point burst gateways generate an explicit congestion notification (ECN) to misbehaving users. To investigate the behavior of misbehaving user traffic, packet delay variation (PDV) ratios are actively estimated and packet transfer rates are passively measured at a unit time. Users who exceed the PDV bit rates specified in their service level agreements (SLAs) are filtered as suspicious users. In addition, suspicious users who exceed the SLA bandwidth bit rates are filtered as network intruders. Simulation results demonstrate that the proposed model efficiently filters network traffic and precisely detects malicious traffic. (C) 2015 Elsevier B.V. All rights reserved.
机译:这项研究提出了一种功能强大,可扩展且可靠的边缘到边缘模型,用于通过实时监视用户行为对服务质量(QoS)法规的影响来过滤恶意流量。该模型调查用户流量,包括通过分布式网关注入的流量和发往实际攻击的网关的流量。仅当网络拥塞时,行为不当的流量过滤才会被触发,此时突发网关会生成明确的拥塞通知(ECN),以防止用户行为不当。为了调查行为不当的用户流量的行为,可以主动估算数据包延迟变化(PDV)比率,并在单位时间内被动地测量数据包传输速率。超过其服务水平协议(SLA)中指定的PDV比特率的用户将被筛选为可疑用户。此外,超过SLA带宽比特率的可疑用户会被过滤为网络入侵者。仿真结果表明,该模型可以有效地过滤网络流量并精确检测恶意流量。 (C)2015 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号