首页> 外文期刊>International Journal of Pattern Recognition and Artificial Intelligence >Combining Renyi Entropy and EWMA to Detect Common Attacks in Network
【24h】

Combining Renyi Entropy and EWMA to Detect Common Attacks in Network

机译:结合Renyi熵和EWMA来检测网络中的常见攻击

获取原文
获取原文并翻译 | 示例
           

摘要

How to timely and precisely identify attack behaviors in network without dealing with a large number of traffic features and historical data, such as training data, is an important research work in the field of network security. In this paper,firstly, the differences between Renyi entropy and Shannon entropy are analyzed and compared. In order to capture network traffic changes exactly, Renyi entropy instead of Shannon entropy is proposed to measure selected traffic features. Then EWMA control chart theory is used to check Renyi entropy time series for detecting and screening anomalies. And three kinds of network attacks are also analyzed and characterized by behavior feature vector for attack identification. Finally a feature similarity based method is used to identify attacks. The experimental results of real traffic traces show that the proposed method has good capability to detect and identify these attacks with less computation cost. To evaluate attack identification method conveniently, an approach is proposed to generate simulated attack traffics. Compared with Shannon entropy-based method, the experiments on simulation traffics show that Renyi entropy-based method has much higher overall accuracy, average precision and average true positive rate. Further comparison indicates the proposed method has more powerful performance to detect attacks than PCA-based method.
机译:如何及时,准确地识别网络中的攻击行为而不处理大量流量特征和历史数据(如训练数据),是网络安全领域的重要研究工作。本文首先分析和比较了仁义熵和香农熵之间的差异。为了准确地捕获网络流量变化,提出了用Renyi熵而不是Shannon熵来测量所选流量特征。然后使用EWMA控制图理论检查Renyi熵时间序列,以检测和筛选异常。并通过行为特征向量对三种网络攻击进行了分析和表征,以进行攻击识别。最后,基于特征相似度的方法被用来识别攻击。真实交通痕迹的实验结果表明,该方法具有较好的检测和识别这些攻击的能力,且计算量较小。为了方便地评估攻击识别方法,提出了一种生成模拟攻击流量的方法。与基于Shannon熵的方法相比,模拟交通量的实验表明,基于Renyi熵的方法具有更高的总体准确度,平均精度和平均真实阳性率。进一步的比较表明,该方法比基于PCA的方法具有更强大的检测攻击性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号