{"title":"基于直方图和自相似矩阵的网络流量检测","authors":"Penglin Yang, Limin Tao, Haitao Wang","doi":"10.1145/3209914.3236336","DOIUrl":null,"url":null,"abstract":"This paper introduces a new network traffic detection method to detect network malicious traffic in different network architectures. In most network traffic data sets, training data and testing data have the same network architecture and traffic features, like the same IP address distribution, the same IP port utilization, etc. But in real network detection, feature differences between training data sets and target network cannot be ignored. In this paper, we use histogram and self-similarity matrix to express these feature differences and keep the traffic features in use at the same time.This method could learn from anomaly network samples and detect real network traffic with feature drift, zoom, and other variants.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network Traffic Detection Based on Histogram and Self-similarity Matrix\",\"authors\":\"Penglin Yang, Limin Tao, Haitao Wang\",\"doi\":\"10.1145/3209914.3236336\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper introduces a new network traffic detection method to detect network malicious traffic in different network architectures. In most network traffic data sets, training data and testing data have the same network architecture and traffic features, like the same IP address distribution, the same IP port utilization, etc. But in real network detection, feature differences between training data sets and target network cannot be ignored. In this paper, we use histogram and self-similarity matrix to express these feature differences and keep the traffic features in use at the same time.This method could learn from anomaly network samples and detect real network traffic with feature drift, zoom, and other variants.\",\"PeriodicalId\":174382,\"journal\":{\"name\":\"Proceedings of the 1st International Conference on Information Science and Systems\",\"volume\":\"110 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 1st International Conference on Information Science and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3209914.3236336\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st International Conference on Information Science and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3209914.3236336","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network Traffic Detection Based on Histogram and Self-similarity Matrix
This paper introduces a new network traffic detection method to detect network malicious traffic in different network architectures. In most network traffic data sets, training data and testing data have the same network architecture and traffic features, like the same IP address distribution, the same IP port utilization, etc. But in real network detection, feature differences between training data sets and target network cannot be ignored. In this paper, we use histogram and self-similarity matrix to express these feature differences and keep the traffic features in use at the same time.This method could learn from anomaly network samples and detect real network traffic with feature drift, zoom, and other variants.