首页> 外文会议>International Conference on Artificial Intelligence and Security >NCGs: Building a Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis
【24h】

NCGs: Building a Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis

机译:NCG:基于网络连接行为分析构建可信赖的环境来识别异常事件

获取原文

摘要

With the continuous development and wide application of various network technologies, such as the mobile, wireless and sensors network, network services are becoming more and more high-speed, diversified and complex. Also, network attacks and infrequent events have emerged, making the promotion of network anomaly detection more and more significant. In order to control and manage the networks and establish a credible network environment, it is critical to facilitate an accurate behavioral characteristic analysis for networks, proactively identify abnormal events associated with network behavior, and improve the capacity of responding to abnormal events. In this paper, we use Network Connection Graphs (NCGs) to model flow activities during network operation. After we construct a NCG in a time-bin, then we can extract graph metric features for quantitative or semi-quantitative analysis of flow activities. And we also could build a series of NCGs to describe the evolution process of network operation. During these NCGs, we have conducted dynamic analysis to find out the outlier points of graph metric features by using Z-score analysis method so that we can detect the hidden abnormal events. The experiment results based on real network traces have demonstrated that the effectiveness of our method in network flow behavior analysis and abnormal event identification.
机译:随着移动,无线和传感器网络等各种网络技术的不断发展和广泛应用,网络服务变得越来越高速,多样化和复杂。另外,网络攻击和偶发事件已经出现,使得网络异常检测的促进越来越重要。为了控制和管理网络并建立可靠的网络环境,至关重要的是促进对网络进行准确的行为特征分析,主动识别与网络行为相关的异常事件并提高对异常事件的响应能力。在本文中,我们使用网络连接图(NCG)对网络运行期间的流量活动进行建模。在一个时间段中构造一个NCG之后,我们可以提取图形度量特征,以对流动活动进行定量或半定量分析。而且,我们还可以构建一系列NCG来描述网络运营的演进过程。在这些NCG期间,我们使用Z分数分析方法进行了动态分析,以找出图形度量特征的离群点,以便我们可以检测到隐藏的异常事件。基于真实网络轨迹的实验结果表明,我们的方法在网络流量行为分析和异常事件识别中的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号