Dissertation > Excellent graduate degree dissertation topics show

Network Anomaly Detection and Analysis Base on Sliding Window Wavelet Binary Tree

Author: ZhuXiaoFeng
Tutor: WangKaiDong
School: Xi'an University of Electronic Science and Technology
Course: Computer System Architecture
Keywords: Wavelet binary sliding window ARX ??model Clustering EM algorithm Anomaly Detection Real-time algorithm
CLC: TP393.08
Type: Master's thesis
Year: 2010
Downloads: 34
Quote: 0
Read: Download Dissertation

Abstract


With the rapid development and popularization of the Internet , the demand for network resources is also increasing rapidly ; while the network also contains a large number of network attacks , and its impact on network performance is growing. Network attacks are a direct manifestation of network traffic anomalies , which calls for fast and efficient detection of an abnormality . This paper presents a new network anomaly detection and analysis methods, through the sliding window wavelet binary and ARX model for network traffic modeling and prediction, and then by clustering the EM algorithm to categorize and detect anomalies . This paper describes the characteristics of the sliding window binary wavelet and calculation methods, such as it can solve the sliding window is generated when the data redundancy ; and the original window to update the data , but also be able to update the corresponding decomposition level wavelet coefficients , reflecting the coefficient update in real time sex . ARX ??model followed by system identification modeling of wavelet coefficients for each layer to obtain the model residuals , and to explore its adaptive time series forecasting applications . Then explore the Gaussian mixture model , EM clustering algorithm theory , and ARX model residuals for cluster analysis and outlier detection . Through the analysis of the mathematical model of collaboration , the algorithm for network traffic anomaly detection, and better reflects the real-time nature . Final data set using KDDCup99 do network traffic anomaly detection experimental results confirm the anomaly detection method can obtain higher rates .

Related Dissertations

  1. Research of Anomaly Detection Algorithms of Hyperspectral Imagery Based on Kernel Method,TP751
  2. Improving of Artificial Imune Classification and Anomaly Detection Algorithms,R392.1
  3. An Algorithm on Clustering and Anomaly Detection for Multiple Data Streams,TP311.13
  4. Research on Network Anomaly Detection Based on Projection Pursuit Regression,TP393.08
  5. Hyperspectral Anomaly Target Detection,TP391.41
  6. Based on non- parametric statistical characteristic quantities Gaussian kernel network traffic anomaly detection method,TP393.07
  7. A Research of RFID Supply Chain Data Anomaly Detection in EPC Network,TP391.44
  8. Based on odor analysis equipment malfunction detection method,TB17
  9. Short-term Urban Traffic Forecasting Based on Multi-kernel SVM Model,U491.14
  10. Anti - assessment model of peer reviewers,TP182
  11. The RBF-ARX Model-based Nonlinear System Modeling and Predictive Control to Magnetic Levitation System,TP13
  12. Database security audit system based on association rules,TP311.13
  13. Research on NetFlow Data Processing and Abnormity Detecting,TP393.08
  14. Research and Application of Burst Abnormality Detection Based on Network Traffic,TP393.06
  15. Physical access control system design and implementation of support for abnormal behavior detection,TP393.08
  16. Adaptive Method for Anomaly Detection Based on Kalman Filter,TN915.08
  17. Research of Anomaly Detection Algorithms of Hyperspectral Imagery Based on Source Data Optimized,TP751.1
  18. Research on Visualization Techniques of Network Security Situation Based on SNMP,TP393.08
  19. Research on Anomaly Detection and Optimization of Firewall Rules,TP393.08
  20. Research on User Profile Attack Detection Algorithm for Collaborative Filtering Recommender Systems,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile