Language:
繁體中文
English
日文
說明(常見問題)
南開科技大學
圖書館首頁
編目中圖書申請
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Enhancing security in an IP backbone...
~
University of Minnesota.
Enhancing security in an IP backbone network.
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
Enhancing security in an IP backbone network./
作者:
Xu, Kuai.
面頁冊數:
125 p.
附註:
Source: Dissertation Abstracts International, Volume: 67-09, Section: B, page: 5213.
Contained By:
Dissertation Abstracts International67-09B.
標題:
Computer Science. -
電子資源:
Download PDF (下載PDF全文)
ISBN:
9780542893209
Enhancing security in an IP backbone network.
Xu, Kuai.
Enhancing security in an IP backbone network.
- 125 p.
Source: Dissertation Abstracts International, Volume: 67-09, Section: B, page: 5213.
Thesis (Ph.D.)--University of Minnesota, 2006.
As the Internet continues to grow in size and complexity, the challenge of effectively provisioning, managing, and securing it has become inextricably linked to a deep understanding of Internet traffic. Due to vast amount of data, and wide diversity of end-hosts and services found in Internet traffic, we need techniques that can extract underlying structures and significant communication patterns.
ISBN: 9780542893209Subjects--Topical Terms:
1000005419
Computer Science.
Enhancing security in an IP backbone network.
LDR
:03422nmm 2200289 4500
001
1000004929
005
20070601084735.5
008
070601s2006 eng d
020
$a
9780542893209
035
$a
(UnM)AAI3235436
035
$a
AAI3235436
040
$a
UnM
$c
UnM{me_controlnum}
100
1
$a
Xu, Kuai.
$3
1000006085
245
1 0
$a
Enhancing security in an IP backbone network.
300
$a
125 p.
500
$a
Source: Dissertation Abstracts International, Volume: 67-09, Section: B, page: 5213.
500
$a
Adviser: Zhi-Li Zhang.
502
$a
Thesis (Ph.D.)--University of Minnesota, 2006.
520
$a
As the Internet continues to grow in size and complexity, the challenge of effectively provisioning, managing, and securing it has become inextricably linked to a deep understanding of Internet traffic. Due to vast amount of data, and wide diversity of end-hosts and services found in Internet traffic, we need techniques that can extract underlying structures and significant communication patterns.
520
$a
In this dissertation, we propose a systematic methodology for profiling Internet backbone traffic that (1) not only automatically discovers significant behaviors (communication patterns) of interest from massive traffic data, (2) but also provides a plausible interpretation of these behaviors to aid security analysts in understanding and quickly identifying anomalous events of significance. For these purposes, a combination of data mining and information-theoretic techniques are employed to automatically cull useful information from largely unstructured data. An entropy-based adaptive algorithm is developed to extract significant clusters of interest. We introduce a behavior classification scheme that automatically groups clusters into classes based on communication patterns and feature distributions using relative uncertainty. In addition, we use dominant state analysis to uncover cluster structure for interpretive analyses. The analysis of traffic data collected from a variety of links at a large IP backbone network shows that the approach indeed provides a robust and meaningful way of characterizing and interpreting network behavior.
520
$a
Given unwanted traffic revealed in exploit behavior profiles, we develop simple yet effective blocking strategies an IP network may pursue to reduce substantial exploit traffic. To demonstrate the operational feasibility, a real-time traffic profiling system has been designed and implemented. Experiment results show that under normal traffic conditions, resources on a commodity PC are sufficient to continuously process flow records and build behavior profiles for high-speed links in operational networks. For sudden traffic surges caused by events such as denial of service attacks or worm outbreaks, a novel profiling aware filtering algorithm is proposed to reduce the CPU and memory cost of the real-time system while maintaining high profiling accuracy. Thus, the profiling system can become an effective tool for security analysts with applications to critical problems such as detecting unknown security exploits and profiling unwanted traffic.
590
$a
School code: 0130.
650
4
$a
Computer Science.
$3
1000005419
690
$a
0984
710
2 0
$a
University of Minnesota.
$3
1000005565
773
0
$t
Dissertation Abstracts International
$g
67-09B.
790
1 0
$a
Zhang, Zhi-Li,
$e
advisor
790
$a
0130
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3235436
$z
Download PDF (下載PDF全文)
0 筆讀者評論
館藏地:
全部
線上資料庫
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約人數
備註欄
附件
OE0000904
線上資料庫
線上資源
線上電子書
OE
一般(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
建立或儲存個人書籤
書目轉出
取書館別
處理中
...
變更密碼
登入