[1]李全. 适用于协议特征提取的多级T+序列树挖掘算法[J].计算机技术与发展,2015,25(10):71-75.
 LI Quan. Mining Algorithm Based on Multilevel T+ Sequence Tree for Protocol Signatures Extracting[J].,2015,25(10):71-75.
点击复制

 适用于协议特征提取的多级T+序列树挖掘算法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年10期
页码:
71-75
栏目:
智能、算法、系统工程
出版日期:
2015-10-10

文章信息/Info

Title:
 Mining Algorithm Based on Multilevel T+ Sequence Tree for Protocol Signatures Extracting
文章编号:
1673-629X(2015)10-0071-05
作者:
 李全
 湖北师范学院 教育信息与技术学院
Author(s):
 LI Quan
关键词:
 流量识别网络规划协议特征T树数据挖掘特征序列PrefixSpan算法
Keywords:
 traffic identificationnetwork planprotocol signaturesT treedata miningfeature sequencePrefixSpan algorithm
分类号:
TP301.6
文献标志码:
A
摘要:
 网络流量识别对于网络规划、网络管理和安全监测等非常重要。基于应用层的协议特征检测技术已成为网络流量识别的主流方法。但是在高速的网络流量识别的过程中,针对传统协议特征提取算法效率较低、可信度较差等问题,提出了一种适用于协议特征提取的多级T+序列树挖掘算法。该方法首先将序列数据库装入内存,构建多级T+序列树,接着对该树进行裁剪,然后通过构建投影T+序列树和连接等操作得到协议特征序列,最后通过一个实例说明了该算法的执行过程。实验结果表明:该算法较基于PrefixSpan的协议识别算法能有效地减少扫描和产生序列数据库的次数,降低磁盘I/O操作的时间,提高了运行效率,从而保证了提取不同协议特征的正确性和可靠性。
Abstract:
 It is very important for network traffic identification in the process of network plan,network management and safety monito-ring. The main method of network traffic identification is protocol feature detection technology based on application layer. In course of high speed network traffic identification,in order to solve the problem of low efficiency and poor reliability of algorithm for traditional protocol signatures extracting,a mining algorithm based on multilevel T+ sequence tree for protocol signatures extracting is proposed. Firstly,the sequence database is loaded into main memory,and multilevel T+ sequence tree is created. Secondly,the tree is cutted. Third-ly,the protocol feature sequence is found by serial operation,such as creating the projection T+ sequence tree and connection and so on. Finally,the implementation process of the algorithm is illustrated through an example. The experimental results indicate that the algorithm effectively reduces the number of scanning and creating sequence database,and saves the time of disk I/O operation compared with the protocol identification algorithm based on PrefixSpan,and improves running efficiency,which verifies the validity and reliability for ex-tracting different protocol feature.

相似文献/References:

[1]黄烟波 周磊戈.基于流特征的P2P流量识别方法研究[J].计算机技术与发展,2009,(09):46.
 HUANG Yan-bo,ZHOU Lei-ge.Research of Identifying P2P Protocols Based on P2P Traffic Characteristics[J].,2009,(10):46.
[2]吴敏 王汝传 蔡涛涛.机器学习在P2P流量检测中的研究[J].计算机技术与发展,2010,(11):133.
 WU Min,WANG Ru-chuan,CAI Tao-tao.Study on Applications of Machine Learning in P2P Traffic Identification[J].,2010,(10):133.
[3]李晟锴.基于决策树的P2P流量识别方法研究[J].计算机技术与发展,2011,(12):29.
 LI Sheng-kai.P2P Network Traffic Classification Based on Decision Tree[J].,2011,(10):29.
[4]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(10):1.
[5]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(10):5.
[6]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(10):13.
[7]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(10):25.
[8]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(10):29.
[9]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(10):34.
[10]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(10):38.
[11]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(10):21.

更新日期/Last Update: 2015-11-12