期刊文献+

基于二值异或群的多轨迹识别算法

A multi-track separating algorithm based on binary XOR group
下载PDF
导出
摘要 针对二值异或群循环轨迹集没有有效的识别算法的问题,进行了高效快速的多轨迹识别算法方面的研究。首先建立了多轨迹识别问题的数学模型,定义了一类新的轨迹——二值异或群循环轨迹,然后针对这类轨迹提出了一种新的识别算法,将求解与基轨迹相异或的元素值的问题转化为求解轨迹特征位模式的问题,并在理论上证明了其正确性,通过这样的处理极大地提高了算法可操作性,最后将此算法应用于共享接入检测场景中并进行了验证。实验证明,此算法具有较高的准确度和误报容忍度,能较好地应用于网络监控和信息安全领域。 For there are no effective separating algorithms at present for binary XOR group circular track sets, the authors conducted the research on a method for rapid and efficient multi-track separation. First, a mathematical model of the multitrack separating theory was built, and a new type of track called the binary XOR group circular track was defined. Then, a new separating algorithm for the kind of track was proposed, by which the problem of solving the element that performs XOR operation with the base track can be converted into deciding the eigen bit mode of the track. It proved to be correct in theory and improved the operability greatly. Finally, the algorithm was applied to the shared-access host number detection to prove its effectiveness. The results indicate that this approach is with the high accuracy and tolerance of mis-report and can be widely used in network monitoring and the information security field.
出处 《高技术通讯》 EI CAS CSCD 北大核心 2010年第10期1033-1039,共7页 Chinese High Technology Letters
基金 863计划(2009AA01Z439) 国家自然科学基金(60821001 U0835001)资助项目
关键词 多轨迹识别 二值异或群 特征位 共享接入 网络监控 multi-track separating, binary XOR group, eigen bit, shared access, network monitoring
  • 相关文献

参考文献15

  • 1Soldani C.Peer-to-peer behaviour detection by TCP flows analysis:[Engineer Dissertation].Liege:University of Liege,France.2004.5. 被引量:1
  • 2韦安明,王洪波,程时端,林宇.高速网络中P2P流量检测及控制方法[J].北京邮电大学学报,2007,30(5):117-120. 被引量:15
  • 3Bellovin S M.A technique for counting NATted hosts.In:Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement.New York:ACM,2002.267-272. 被引量:1
  • 4Postel J.Internet Protocol.RFC 791,1981. 被引量:1
  • 5Stevens W R.TCP/IP Illustrated (vol.1):the Protocols.Boston:Addison-Wesley Longman Publishing Co.,1993.24-27. 被引量:1
  • 6Kohno T,Broido A,Claffy K C.Remote physical device fingerprinting.IEEE Transactions on Dependable and Secure Computing,2005,2(2):93-108. 被引量:1
  • 7Beverly R.A robust classifier for passive TCP/IP fingerprinting.Lecture Notes in Computer Science.2004,3015:158-167. 被引量:1
  • 8Li Z,Yuan R,Guan X.Accurate classification of the Internet traffic based on the SVM method.In:Proceedings of the IEEE International Conference on Communications,Glasgow,UK,2007.1373-1378. 被引量:1
  • 9Dornhoff L L,Hohn F E.Applied Modern Algebra.New York:MacMillan Publishing Co.,1978.201-202. 被引量:1
  • 10丁文霞,卢焕章,谢剑斌.混沌二值序列对异或运算构成群的理论和实验证明[J].系统工程与电子技术,2006,28(9):1420-1422. 被引量:5

二级参考文献14

  • 1Matthews R. On the derivation of a 'chaotic' encryption algorithm [J]. Cryptologia,1989,13(1): 29-42. 被引量:1
  • 2Shi C, Bhargava B. Light eight MPEG video encryption algorithm[C]//Proc of the Int'l Conf. on Multimedia'98, January, New Delhi, india, 1998:55-61. 被引量:1
  • 3Josef Scharinger. Fast encryption of image data using chaotic kolmogorov flows[J]. Jiri Fridich , "Secure Image Ciphering Based on Chaos," Final Technical Report, Rome Laboratory, SPIE, NewYork, February, 1997,3022:278-289. 被引量:1
  • 4Kohda T, Tsuneda A. Explicit evaluation of correlation functions of chebyshev binary and bit sequences based on perron-Frobenius operator[J]. IEICE Trans. on Fundamentals. 1994, E77 A(11):423-436. 被引量:1
  • 5Sen S, Spatscheck O, Wang D. Accurate scalable in network identification of P2P traffic using application signatures [ C ] ff Proceedings of WWW Conference. NY: ACM, 2004: 512-521. 被引量:1
  • 6Karagiannis T, Broido A, Brownlee N, et al. File sharing in the Internet. a characterization of P2P traffic in the backbone [OB/OL]. 2004 [2007-01-15 ]. http://www. cs. ucr. edu/- tkarag. 被引量:1
  • 7Kostas Pagiamtzis, Ali Sheikholeslami. Content addressable memory (CAM) circuits and architectures: a tutorial and survey [J]. IEEE Journal of Solid-State Circuits, 2006, 41(3): 712-727. 被引量:1
  • 8Mahajan R, Floyd S, Wetherall D. Controlling high- bandwidth flows at the congested router [ C]//ICNP 2001. Washington: IEEE, 2001: 192. 被引量:1
  • 9Padhye J, Firoiu V, Towsley D, et al. Modeling TCP throughput:a simple model and its empirical validation [J ]. IEEE/ACM Trans on Networking, 2000, 8 (2) : 133-145. 被引量:1
  • 10Yu F, Katz R, Lakshman T. Gigabit rate packet pattern matching using TCAM [ C] // ICNP 2004. Washington: IEEE, 2004: 174-183. 被引量:1

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部