首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机的应用论文--计算机网络论文--一般性问题论文

网间IP流量行为分析与关系发现

摘要第5-7页
ABSTRACT第7-9页
Chapter 1 Introduction第19-56页
    1.1 Network Security Threats第19-20页
    1.2 network monitoring第20-25页
        1.2.1 The Reasons for Monitoring第20-21页
        1.2.2 Monitoring within the operational cycle of network management第21-22页
        1.2.3 Active vs. passive monitoring第22-23页
        1.2.4 Sampling第23页
        1.2.5 Netflow第23-25页
    1.3 Network Security Situational Awareness NSSA第25-47页
        1.3.1 The demand for new security tools第25-26页
        1.3.2 Early proposals of applying SA in cyber security第26-27页
        1.3.3 The functional definition of situational awareness第27-29页
        1.3.4 The evolution of Situational Awareness第29-30页
        1.3.5 The three levels of SA第30-31页
        1.3.6 Requirements for situation assessment第31-32页
        1.3.7 Cyber situation awareness第32-34页
        1.3.8 Situation awareness and multi-sensor data fusion第34-38页
        1.3.9 A review of previous works related to NSSA第38-47页
    1.4 Research Scope and Significance第47-53页
        1.4.1 The position of this research in NSSA Model第47-49页
        1.4.2 Network Traffic Behavior第49-50页
        1.4.3 Host Behavior Profiles and Role Classification第50-51页
        1.4.4 Relationship Discovery第51-53页
    1.5 Research Objectives第53-54页
    1.6 Challenges第54-55页
    1.7 Dissertation layout第55-56页
Chapter 2 Profiling and Clustering IP Hosts Based on Traffic Behavior第56-84页
    2.1 Introduction第56-57页
    2.2 Background第57-65页
        2.2.1 IP Profiling and Clustering第57-61页
        2.2.2 Entropy第61-62页
        2.2.3 Clustering第62-64页
        2.2.4 Weka第64-65页
    2.3 Data Sources第65-66页
    2.4 Methodology第66-67页
    2.5 Extraction of the most significant IP addresses第67-69页
    2.6 Selection and extraction of communication pattern features第69-78页
    2.7 Clustering AND Results discussion第78-81页
    2.8 Semantics of some selected clusters第81-82页
        2.8.1 Clients sending http requests第81页
        2.8.2 P2P Traffic第81页
        2.8.3 Scanning a single port第81-82页
        2.8.4 Server traffic behavior第82页
    2.9 Summary第82-84页
Chapter 3 IP Relationship Discovery第84-102页
    3.1 Introduction第84-88页
    3.2 Background第88-92页
        3.2.1 Communities detection第89-91页
        3.2.2 Comparison with previous works第91-92页
    3.3 The Proposed Methodology第92-100页
        3.3.1 Split the observed IP addresses into inside and outside第93-94页
        3.3.2 Construction of the bipartite graph第94-95页
        3.3.3 One-mode projection第95-96页
        3.3.4 Clustering第96-100页
    3.4 Summary第100-102页
Chapter 4 Practical Implementation & Evaluation第102-115页
    4.1 Experiment Environment第102页
    4.2 Experiment Results第102-105页
    4.3 Discussion and Evaluation第105-114页
        4.3.1 Modularity第105-107页
        4.3.2 Inter-communities vs. Intra-communities Links第107-108页
        4.3.3 Sizes of Communities第108-109页
        4.3.4 Clusters stability第109-111页
        4.3.5 Time complexity of the proposed approach第111-113页
        4.3.6 Limitations and errors第113-114页
    4.4 Summary第114-115页
Chapter 5 Semantics Analysis of The Discovered clusters第115-126页
    5.1 Dominant behavior of communities第115-117页
    5.2 Closed groups第117-125页
        5.2.1 Closed Group Example 1第117-122页
        5.2.2 Closed Group Example 2第122-125页
    5.3 Outliers第125页
    5.4 Summary第125-126页
Chapter 6 Final Conclusion and Future Prospects第126-128页
References第128-144页
List of publications第144-146页
Acknowledgements第146-147页
Biography第147页

论文共147页,点击 下载论文
上一篇:我国外保内贷的相关法律研究
下一篇:B细胞中JAK1-STAT1通路活化的机制及其在SLE中的作用