基于流量預(yù)處理的新型流關(guān)聯(lián)技術(shù)的研究
[Abstract]:While the Internet brings convenience to people's daily life, its security problems are increasing day by day. Stream authentication is an important problem in anonymous communication tracking and springboard intrusion detection. Although the commonly used network pipeline printing technology can effectively identify and track the source of data flow, it is difficult to achieve strong robustness and concealment at the same time. For example, in the network pipelining method based on time interval, after forwarding or recording all kinds of traffic characteristics, the watermark embedding process is completed by reducing or enlarging the delay between adjacent packets. Because the time delay introduced by this method in each slot Qg is relatively small, the watermark has better concealment. However, once packet loss, packet recombination and false packet injection occur in the network flow, the self-synchronization of the watermark may be invalidated, and the embedded special signal can not be recovered. Therefore, the robustness of stream watermarking is weak. The research goal of this paper is to design both robust and adaptive flow identifiers without forwarding and disturbing traffic patterns in order to accurately and efficiently match network flows. In general, this study aims to provide a potentially interesting perspective for the combination of traditional traffic analysis techniques with classical information theory and cryptographic principles. On the one hand, the chaos characteristic hidden in traffic mode is explored by Takens theorem, and a stream identifier based on Huffman coding is obtained. On the other hand, a stream identifier based on Shamir (TCN) threshold secret sharing mechanism is constructed on the basis of selecting unique and robust traffic characteristics by using the inherent sudden and chaotic characteristics of network flow. The experimental results show that the proposed scheme still has better detection performance under the network interference such as delay jitter packet malicious drop false packet injection and so on compared with the existing more important methods.
【學(xué)位授予單位】:華僑大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TP393.08
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 衛(wèi)俊平,陳明宇,余智華,郭莉;高速網(wǎng)絡(luò)流產(chǎn)生系統(tǒng)[J];計(jì)算機(jī)應(yīng)用;2003年06期
2 武佳寧;;基于序列特征的網(wǎng)絡(luò)流分類方法研究[J];電子設(shè)計(jì)工程;2013年23期
3 張峰,雷振明;高速網(wǎng)絡(luò)流測(cè)量及模型研究[J];計(jì)算機(jī)工程與應(yīng)用;2004年17期
4 阿呆;;Netronome:為亞太區(qū)量身定制解決方案[J];通訊世界;2011年04期
5 龍熙華;韓大中;;線性多商品網(wǎng)絡(luò)流算法與多煤種調(diào)運(yùn)優(yōu)化[J];西安礦業(yè)學(xué)院學(xué)報(bào);1987年03期
6 孫旺弟,徐和杰;網(wǎng)絡(luò)流理論在配水系統(tǒng)壓力優(yōu)化計(jì)算中的應(yīng)用[J];鎮(zhèn)江船舶學(xué)院學(xué)報(bào);1990年03期
7 高峰修,黃根勛,張利民;基于網(wǎng)絡(luò)流上的秘密共享體制[J];通信技術(shù);2002年04期
8 葉麟;張宏莉;何慧;;基于主成分分析的網(wǎng)絡(luò)流相關(guān)性研究[J];計(jì)算機(jī)工程;2007年12期
9 季海波,楊蓓,沈廉;關(guān)于二元網(wǎng)絡(luò)流算法的一個(gè)推廣[J];中國(guó)科學(xué)技術(shù)大學(xué)學(xué)報(bào);1998年03期
10 王可定,,封樹標(biāo);多源點(diǎn)網(wǎng)絡(luò)流圖的計(jì)算機(jī)解法[J];系統(tǒng)工程理論與實(shí)踐;1994年08期
相關(guān)重要報(bào)紙文章 前2條
1 本報(bào)記者 龔保華;讓電視網(wǎng)絡(luò)流光溢彩[N];吉林日?qǐng)?bào);2013年
2 ;賽門鐵克ManHunt 網(wǎng)絡(luò)獵手[N];計(jì)算機(jī)世界;2003年
相關(guān)碩士學(xué)位論文 前10條
1 蔣曉路;網(wǎng)絡(luò)流特征的時(shí)頻分析及其應(yīng)用研究[D];電子科技大學(xué);2014年
2 楊嘉佳;高速網(wǎng)絡(luò)流過(guò)濾關(guān)鍵技術(shù)研究與應(yīng)用[D];長(zhǎng)沙理工大學(xué);2014年
3 吳輝;基于模糊K-Means的網(wǎng)絡(luò)流分類系統(tǒng)研究與實(shí)現(xiàn)[D];廣東工業(yè)大學(xué);2016年
4 顏敏玲;多層次網(wǎng)絡(luò)流識(shí)別技術(shù)研究與實(shí)現(xiàn)[D];西南交通大學(xué);2016年
5 陳怡然;基于網(wǎng)絡(luò)流和連接特征的端主機(jī)分類[D];電子科技大學(xué);2016年
6 張煥娜;基于流連接行為分析的通信網(wǎng)絡(luò)異常事件識(shí)別方法研究[D];電子科技大學(xué);2016年
7 侯翔宇;并行網(wǎng)絡(luò)流分類技術(shù)研究[D];哈爾濱理工大學(xué);2016年
8 王志剛;作業(yè)感知的Hadoop集群網(wǎng)絡(luò)調(diào)度方法研究[D];大連理工大學(xué);2016年
9 李浩宇;智慧標(biāo)識(shí)網(wǎng)絡(luò)流適配機(jī)制的設(shè)計(jì)與實(shí)現(xiàn)[D];北京交通大學(xué);2017年
10 周鵬飛;抗匿名網(wǎng)絡(luò)流變換的時(shí)隙質(zhì)心網(wǎng)絡(luò)流水印技術(shù)研究[D];南京理工大學(xué);2017年
本文編號(hào):2350296
本文鏈接:http://www.lk138.cn/shoufeilunwen/xixikjs/2350296.html