Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Analysis of Abnormal Traffic Identification Technology Based on Network Protocol
LIU Xiao-xiao
Business College of Shanxi University
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  This paper presents the abnormal traffic identification model based on network protocol; analyzes the network data layer combining with network protocol analysis and network intrusion detection technology; discovers the abnormal traffic IP address set through frequent IP address clustering, and counts the amount of abnormal data packets. With the simulation test of DDOS attack, it is proved that the model has high recognition ability and has good performance in terms of efficiency and calculation.
Key wordsnetwork protocol analysis      abnormal traffic identification      intrusion detection technology      network attack     
ZTFLH:  TP393.08  

Cite this article:

LIU Xiao-xiao. Analysis of Abnormal Traffic Identification Technology Based on Network Protocol. Computer & Telecommunication, 2017, 1(12): 56-58.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2017/V1/I12/56

[1] GAO Pan LIN Li. Discussion on the Omni-directional Defense for Virus Defense[J]. 电脑与电信, 2019, 1(5): 45-47.
[2] LIU Jin YAN Cong YUAN Xi. Research on Security Baseline Configuration Verification Based on Cloud Computing Virtualization Platform[J]. 电脑与电信, 2019, 1(1-2): 28-34.
[3] GUAN Yu. A RFID Authentication Protocol[J]. 电脑与电信, 2018, 1(4): 31-33.
[4] LU Yu-fan, WANG Xun. Research on the Hadoop Platform Safety Reinforcement Based on the Kerberos Authentication Mechanism[J]. 电脑与电信, 2018, 1(1-2): 47-49.
[5] WUWen-gang, ZHANG Xin. The Application of Penetration Test in Level Evaluation[J]. 电脑与电信, 2018, 1(1-2): 67-69.
[6] TANG Jun-ming. Network Security Analysis Method for Big Data[J]. 电脑与电信, 2017, 1(12): 62-63.
[7] XUE Jin-song , FENG Ren-jun. Network security technology based on LAN environment[J]. 电脑与电信, 2017, 1(11): 92-94.
[8] Xie Fan. Analysis on the Computer Network Security and Router Troubleshooting[J]. 电脑与电信, 2017, 1(7): 42-43.
[9] Li Fangjun. The Application of Data Encryption Technology in Computer Network Communication Security[J]. 电脑与电信, 2017, 1(5): 59-61.
[10] Zou Ning. Design and Realization of a Kind of Network Tool Software Based on Jpcap[J]. 电脑与电信, 2017, 1(4): 47-49.
[11] Chen Fubin. Thoughts on Computer Network Security Precautions[J]. 电脑与电信, 2016, 1(12): 84-85.
[12] Zhao Yonggang. Design of the LAN Computer Network Security Monitoring Platform Based on Nagios[J]. 电脑与电信, 2016, 1(11): 48-49.
[13] Shen Lixiang. The Security of Linux Server Deployment[J]. 电脑与电信, 2016, 1(11): 50-52.
[14] Chen Zhen. Research on the Role of Virtual Network Technology in Computer Network Security[J]. 电脑与电信, 2016, 1(9): 31-32.
[15] Cui Aiguo. Network Security Technology under INTRANET Based on Intelligent Firewall[J]. 电脑与电信, 2016, 1(9): 33-35.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd