[1]曾永忠[] []张帅[] 马忠权[]. 一种基于用户会话的异常检测方法[J].计算机技术与发展,2014,24(07):141-144.
 ZENG Yong-zhong[][],ZHANG Shuai[] A Zhong-quan[]. An Anomaly Detection Method Based on Session[J].,2014,24(07):141-144.
点击复制

 一种基于用户会话的异常检测方法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年07期
页码:
141-144
栏目:
安全与防范
出版日期:
2014-07-10

文章信息/Info

Title:
 An Anomaly Detection Method Based on Session
文章编号:
1673-629X(2014)07-0141-04
作者:
 曾永忠[1] [2]张帅[1] 马忠权[2]
 1.四川大学 计算机学院; 2.西昌卫星发射中心
Author(s):
 ZENG Yong-zhong[1][2] ZHANG Shuai[1] A Zhong-quan[2]
关键词:
 Web日志数据预处理访问行为贝叶斯有监督学习 
Keywords:
 Web logdata-preprocessingaccess behaviorNa?ve Bayesiansupervised learning
分类号:
TP311
文献标志码:
A
摘要:
 随着网络技术的发展,人们对网络的依赖性越来越强,但同时网络攻击给网络用户造成了严重的信息泄露和巨大的经济损失。如何从浩瀚的用户访问信息中发现对网站具有恶意攻击行为的用户就成为了Web服务管理者亟需解决的重要问题。对Web服务日志的深入分析后,发现攻击访问用户与正常访问用户在访问Web服务时形成的日志记录具有不同的特征。通过特征提取并且进行必要假设后,利用朴素贝叶斯分类算法构建异常检测分类模型,取得了较好的检测效果。
Abstract:
 With the development of network technology,the dependence of the network is more and more strong,but simultaneously the network attack cause serious leak of information and huge economic losses. How to find out the attacker from vast user access information is an important issue needs to be solved for Web service administrator. After the deep analysis of Web service log,find that there are dif-ferent in character between abnormal and normal access users. By feature extracting and making some necessary assumptions,build anom-aly detection model using Na?ve Bayesian classifier with a good detection effect.

相似文献/References:

[1]邵兰洁 李光忠.Web使用挖掘的数据采集技术探究[J].计算机技术与发展,2010,(03):225.
 SHAO Lan-jie,LI Guang-zhong.Research on Techniques of Data Collecting for Web Usage Mining[J].,2010,(07):225.
[2]王琼 刘珏 徐汀荣.结合Web站点结构的路径补充[J].计算机技术与发展,2007,(06):120.
 WANG Qiong,LIU Jue,XU Ting-rong.Combining With the Structure of Website for Path Complement[J].,2007,(07):120.
[3]吴辉娟 袁方.个性化服务技术研究[J].计算机技术与发展,2006,(02):32.
 WU Hui-juan,YUAN Fang.Research of Technologies on Personalized Information Service[J].,2006,(07):32.
[4]周爱武 肖云 封军.Web日志挖掘数据预处理优化[J].计算机技术与发展,2011,(01):42.
 ZHOU Ai-wu,XIAO Yun,FENG Jun.An Improved Method for Data Preprocessing in Web Log Mining[J].,2011,(07):42.
[5]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(07):1.
[6]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(07):5.
[7]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(07):13.
[8]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(07):21.
[9]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(07):25.
[10]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(07):29.

更新日期/Last Update: 2015-03-13