CN104270373B - A kind of Web server anonymous access flow rate testing methods based on temporal characteristics - Google Patents
A kind of Web server anonymous access flow rate testing methods based on temporal characteristics Download PDFInfo
- Publication number
- CN104270373B CN104270373B CN201410535015.8A CN201410535015A CN104270373B CN 104270373 B CN104270373 B CN 104270373B CN 201410535015 A CN201410535015 A CN 201410535015A CN 104270373 B CN104270373 B CN 104270373B
- Authority
- CN
- China
- Prior art keywords
- web server
- temporal characteristics
- access flow
- alpha
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000002123 temporal effect Effects 0.000 title claims abstract description 53
- 238000012360 testing method Methods 0.000 title claims abstract description 36
- 238000012706 support-vector machine Methods 0.000 claims abstract description 9
- 239000013598 vector Substances 0.000 claims description 39
- 230000006870 function Effects 0.000 claims description 29
- 238000000034 method Methods 0.000 claims description 10
- 230000009977 dual effect Effects 0.000 claims description 9
- 238000000605 extraction Methods 0.000 claims description 7
- 238000012549 training Methods 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000012790 confirmation Methods 0.000 claims description 3
- 238000013507 mapping Methods 0.000 claims description 3
- 238000001514 detection method Methods 0.000 abstract description 10
- 238000004891 communication Methods 0.000 description 11
- 239000000203 mixture Substances 0.000 description 9
- 241000234282 Allium Species 0.000 description 5
- 235000002732 Allium cepa var. cepa Nutrition 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000007812 deficiency Effects 0.000 description 2
- 238000002347 injection Methods 0.000 description 2
- 239000007924 injection Substances 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000000243 solution Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410535015.8A CN104270373B (en) | 2014-10-11 | 2014-10-11 | A kind of Web server anonymous access flow rate testing methods based on temporal characteristics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410535015.8A CN104270373B (en) | 2014-10-11 | 2014-10-11 | A kind of Web server anonymous access flow rate testing methods based on temporal characteristics |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104270373A CN104270373A (en) | 2015-01-07 |
CN104270373B true CN104270373B (en) | 2017-07-14 |
Family
ID=52161863
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410535015.8A Active CN104270373B (en) | 2014-10-11 | 2014-10-11 | A kind of Web server anonymous access flow rate testing methods based on temporal characteristics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104270373B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106919579B (en) * | 2015-12-24 | 2020-11-06 | 腾讯科技(深圳)有限公司 | Information processing method, device and equipment |
CN113382405A (en) * | 2021-04-24 | 2021-09-10 | 胡志成 | Network space information security control method and application |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005244429A (en) * | 2004-02-25 | 2005-09-08 | Intelligent Cosmos Research Institute | Feature quantity extracting method for detecting abnormality of network, program for allowing computer to execute the method, feature quantity extracting apparatus, and network abnormality detecting system |
CN101635658A (en) * | 2009-08-26 | 2010-01-27 | 中国科学院计算技术研究所 | Method and system for detecting abnormality of network secret stealing behavior |
CN101950464A (en) * | 2010-09-17 | 2011-01-19 | 中国科学院深圳先进技术研究院 | Method and system for fall monitoring and warning |
CN102435910A (en) * | 2011-09-14 | 2012-05-02 | 南京航空航天大学 | Power electronic circuit health monitoring method based on support vector classification |
CN103001805A (en) * | 2012-12-17 | 2013-03-27 | 重庆邮电大学 | Web user flow producing method based on user behavior analysis |
CN103078856A (en) * | 2012-12-29 | 2013-05-01 | 大连环宇移动科技有限公司 | Method for detecting and filtering application layer DDoS (Distributed Denial of Service) attack on basis of access marking |
-
2014
- 2014-10-11 CN CN201410535015.8A patent/CN104270373B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005244429A (en) * | 2004-02-25 | 2005-09-08 | Intelligent Cosmos Research Institute | Feature quantity extracting method for detecting abnormality of network, program for allowing computer to execute the method, feature quantity extracting apparatus, and network abnormality detecting system |
CN101635658A (en) * | 2009-08-26 | 2010-01-27 | 中国科学院计算技术研究所 | Method and system for detecting abnormality of network secret stealing behavior |
CN101950464A (en) * | 2010-09-17 | 2011-01-19 | 中国科学院深圳先进技术研究院 | Method and system for fall monitoring and warning |
CN102435910A (en) * | 2011-09-14 | 2012-05-02 | 南京航空航天大学 | Power electronic circuit health monitoring method based on support vector classification |
CN103001805A (en) * | 2012-12-17 | 2013-03-27 | 重庆邮电大学 | Web user flow producing method based on user behavior analysis |
CN103078856A (en) * | 2012-12-29 | 2013-05-01 | 大连环宇移动科技有限公司 | Method for detecting and filtering application layer DDoS (Distributed Denial of Service) attack on basis of access marking |
Non-Patent Citations (1)
Title |
---|
基于支持向量机的网络流量分类检测系统的研究与实现;刘健男;《中国优秀硕士学位论文全文数据库信息科技辑》;20120915;摘要部分 * |
Also Published As
Publication number | Publication date |
---|---|
CN104270373A (en) | 2015-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Azeez et al. | Identifying phishing attacks in communication networks using URL consistency features | |
CN104333562B (en) | Data pack transmission method and device | |
CN110519298A (en) | A kind of Tor method for recognizing flux and device based on machine learning | |
CN107046468A (en) | A kind of physical layer certification thresholding determines method and system | |
Li et al. | Demographic information inference through meta-data analysis of Wi-Fi traffic | |
CN102710770A (en) | Identification method for network access equipment and implementation system for identification method | |
CN107733863A (en) | Daily record adjustment method and device under a kind of distributed hadoop environment | |
CN102281337A (en) | destination address access control method and system | |
CN112929390A (en) | Network intelligent monitoring method based on multi-strategy fusion | |
Folorunso et al. | Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach | |
CN106789945A (en) | A kind of network equipment and network log-in management method | |
Zhong et al. | Stealthy malware traffic-not as innocent as it looks | |
Nouh et al. | Towards designing a multipurpose cybercrime intelligence framework | |
CN104270373B (en) | A kind of Web server anonymous access flow rate testing methods based on temporal characteristics | |
Pastor-Galindo et al. | Nothing to hide? On the security and privacy threats beyond open data | |
US20160127324A1 (en) | Privacy protected internet networks, subnetworks and sub-subnetworks | |
CN109858510A (en) | A kind of detection method for http protocol ETag value covert communications | |
CN110414594A (en) | A kind of encryption traffic classification method determined based on dual-stage | |
CN109257384A (en) | Application layer ddos attack recognition methods based on access rhythm matrix | |
US11038921B1 (en) | Detecting malicious actors | |
Kadam et al. | Various approaches for intrusion detection system: an overview | |
Aqeel | Internet of things: Systematic literature review of security and future research | |
CN109615418A (en) | A kind of two melt the method for digging of account client | |
Hang et al. | Pervasive hybrid two-stage fusion model of intelligent wireless network security threat perception | |
Smith | Hiding in the noise: Creation and detection analysis of modern covert channels |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20160425 Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant after: State Grid Corporation of China Applicant after: China Electric Power Research Institute Applicant after: State Grid Smart Grid Institute Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant before: State Grid Corporation of China Applicant before: China Electric Power Research Institute |
|
CB02 | Change of applicant information |
Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant after: State Grid Corporation of China Applicant after: China Electric Power Research Institute Applicant after: GLOBAL ENERGY INTERCONNECTION RESEARCH INSTITUTE Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant before: State Grid Corporation of China Applicant before: China Electric Power Research Institute Applicant before: State Grid Smart Grid Institute |
|
COR | Change of bibliographic data | ||
GR01 | Patent grant | ||
GR01 | Patent grant |