Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Enhancing security in an IP backbone...
~
Xu, Kuai.
Linked to FindBook
Google Book
Amazon
博客來
Enhancing security in an IP backbone network.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Enhancing security in an IP backbone network./
Author:
Xu, Kuai.
Description:
125 p.
Notes:
Adviser: Zhi-Li Zhang.
Contained By:
Dissertation Abstracts International67-09B.
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3235436
ISBN:
9780542893209
Enhancing security in an IP backbone network.
Xu, Kuai.
Enhancing security in an IP backbone network.
- 125 p.
Adviser: Zhi-Li Zhang.
Thesis (Ph.D.)--University of Minnesota, 2006.
As the Internet continues to grow in size and complexity, the challenge of effectively provisioning, managing, and securing it has become inextricably linked to a deep understanding of Internet traffic. Due to vast amount of data, and wide diversity of end-hosts and services found in Internet traffic, we need techniques that can extract underlying structures and significant communication patterns.
ISBN: 9780542893209Subjects--Topical Terms:
626642
Computer Science.
Enhancing security in an IP backbone network.
LDR
:03367nam 2200289 a 45
001
974502
005
20110929
008
110929s2006 eng d
020
$a
9780542893209
035
$a
(UnM)AAI3235436
035
$a
AAI3235436
040
$a
UnM
$c
UnM
100
1
$a
Xu, Kuai.
$3
1298429
245
1 0
$a
Enhancing security in an IP backbone network.
300
$a
125 p.
500
$a
Adviser: Zhi-Li Zhang.
500
$a
Source: Dissertation Abstracts International, Volume: 67-09, Section: B, page: 5213.
502
$a
Thesis (Ph.D.)--University of Minnesota, 2006.
520
$a
As the Internet continues to grow in size and complexity, the challenge of effectively provisioning, managing, and securing it has become inextricably linked to a deep understanding of Internet traffic. Due to vast amount of data, and wide diversity of end-hosts and services found in Internet traffic, we need techniques that can extract underlying structures and significant communication patterns.
520
$a
In this dissertation, we propose a systematic methodology for profiling Internet backbone traffic that (1) not only automatically discovers significant behaviors (communication patterns) of interest from massive traffic data, (2) but also provides a plausible interpretation of these behaviors to aid security analysts in understanding and quickly identifying anomalous events of significance. For these purposes, a combination of data mining and information-theoretic techniques are employed to automatically cull useful information from largely unstructured data. An entropy-based adaptive algorithm is developed to extract significant clusters of interest. We introduce a behavior classification scheme that automatically groups clusters into classes based on communication patterns and feature distributions using relative uncertainty. In addition, we use dominant state analysis to uncover cluster structure for interpretive analyses. The analysis of traffic data collected from a variety of links at a large IP backbone network shows that the approach indeed provides a robust and meaningful way of characterizing and interpreting network behavior.
520
$a
Given unwanted traffic revealed in exploit behavior profiles, we develop simple yet effective blocking strategies an IP network may pursue to reduce substantial exploit traffic. To demonstrate the operational feasibility, a real-time traffic profiling system has been designed and implemented. Experiment results show that under normal traffic conditions, resources on a commodity PC are sufficient to continuously process flow records and build behavior profiles for high-speed links in operational networks. For sudden traffic surges caused by events such as denial of service attacks or worm outbreaks, a novel profiling aware filtering algorithm is proposed to reduce the CPU and memory cost of the real-time system while maintaining high profiling accuracy. Thus, the profiling system can become an effective tool for security analysts with applications to critical problems such as detecting unknown security exploits and profiling unwanted traffic.
590
$a
School code: 0130.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2 0
$a
University of Minnesota.
$3
676231
773
0
$t
Dissertation Abstracts International
$g
67-09B.
790
$a
0130
790
1 0
$a
Zhang, Zhi-Li,
$e
advisor
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3235436
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9132732
電子資源
11.線上閱覽_V
電子書
EB W9132732
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login