Network traffic abnormality rapid detection method based on multilayer partial sensitive hash table

A sensitive hash table and network traffic technology, applied in the field of computer technology and network, can solve the problem of high time cost of SVD, achieve the effect of reducing the overall time complexity, reducing time complexity, and realizing rapid detection

Active Publication Date: 2017-08-18
HUNAN UNIV
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, DRMF also has many shortcomings when used in actual network anomaly detection: ① DRMF uses singular value decomposition (singular value decomposition, SVD) when solving the low-rank component

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network traffic abnormality rapid detection method based on multilayer partial sensitive hash table
  • Network traffic abnormality rapid detection method based on multilayer partial sensitive hash table
  • Network traffic abnormality rapid detection method based on multilayer partial sensitive hash table

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] 1) Questions

[0051] Step 1: System Modeling

[0052] Assuming that the network is composed of N nodes, the present invention models the flow data into a flow matrix The rows of the traffic matrix X represent the traffic data of a single OD (source node and destination node) pair in each time slot, the columns of the traffic matrix X represent the traffic data of all OD pairs in the same time slot, and n represents the total number of time slots.

[0053] Due to the characteristics of temporal stability and spatial correlation of flow data, normal flow data will be located in a low-dimensional linear subspace to form a low-rank matrix, and abnormal flow data will be located outside this low-dimensional linear subspace to form an abnormal matrix. Therefore, the anomaly detection problem is attributed to the following constrained optimization problem:

[0054]

[0055] where S is the anomalous matrix, L is the low-rank approximation of the matrix X-S, k is the trun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network traffic abnormality rapid detection method based on a multilayer partial sensitive hash table. Through utilization of the multilayer partial sensitive hash table, OD pair vectors are buffered and rearranged, so the similar OD pair vectors are mapped to the same hash barrels. On the basis of the multilayer partial sensitive hash table, an adaptive subspace search method and a partial sensitive hash table updating method are designed, so the time complexity of a low-rank matrix approximate process in network traffic abnormality detection is greatly reduced, the integrated time complexity of the abnormality detection is reduced, and the traffic abnormality rapid detection is realized.

Description

technical field [0001] The invention relates to the fields of computer technology and network technology, in particular to an application where abnormal network traffic occurs and the location of the abnormality needs to be quickly located, and specifically relates to a method for quickly detecting abnormal network traffic based on a multi-layer locally sensitive hash table. Background technique [0002] In recent years, with the continuous development of computer technology and the continuous deepening of network applications, the network not only plays an important role in various fields such as industry, banking, scientific research and education, but also has already entered thousands of households, making the network play an important role in people's daily work and life. play an increasingly important role. With the continuous expansion of network scale and the rapid development of computer technology and network technology, the possibility of various security and perf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 黄俊谢鲲陈宇翔文吉刚
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products