Font Size: a A A

Research On Routing Behavior Anomaly Detection Method For Information Center Network

Posted on:2021-06-16Degree:MasterType:Thesis
Country:ChinaCandidate:M M HeFull Text:PDF
GTID:2518306107970409Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Recently,ICN has gradually become a popular research topic.It overcomes many inherent security problems in traditional networks by protecting the content itself,but also brings new types of attacks from Do S to privacy attacks.Therefore,anomaly-based network intrusion detection has gradually developed and become a basic method to solve this problem.This method defines "normal" operating behaviors based on system operating behaviors monitored over a period of time,then uses this normal behavior as a standard to define a reasonable deviation metric,and finally detects abnormal events in the network.In this paper,ICN's routing security research is conducted,and abnormalities are identified by detecting the routing behavior of ICN.The research content of this paper is mainly divided into two parts:First,because identifying major changes in network behavior is important for prevent network anomalies,an anomaly detection method based on event logs is proposed.The key feature of the method is to select characteristics from the log,and then use the ridge regression method to determine abnormal conditions.First,learn the historical information of the system and establish the standard of normal behavior,and give an accurate indication of the time period when the system has problems.At the same time,it establishes a problem "signature" that maps customer issues to issues already seen in related fields.Because it distinguishes between anomalies and faults,it greatly alleviates the system false alarms.Finally,this paper also considers the recovery of some security links not affected by the exception.Secondly,a label-based rerouting method is proposed.Routing interruption is a problem that has attracted much attention in recent years.Rerouting is an effective method to solve this problem.After the abnormal route is detected,the transmission path of the network needs to be updated to ensure the security of the network connection.Therefore,a reroute framework is proposed.It mainly calculates the path for each target in advance,and when a certain route is abnormal,it modifies the path of all packets passing through this route.This article only updates the path by adding a forwarding rule,which reduces the recovery time of the outage.Finally,a comprehensive evaluation of the rerouting framework is performed.This topic is mainly to study the security issues of ICN,associate the abnormal behavior of ICN routing with its log,mine abnormal events from the log,and obtain the location of the abnormality.Then this article considers the restoration of the connection to the nodes without abnormal conditions to ensure the normal operation of the network.The routing path is calculated in advance for the user's request and backup is selected to make the data bypass the abnormal node and finally arrive at the destination safely.The work done in this article effectively identifies network anomalies,improves security performance,and reduces the recovery time of network outages due to anomalies.
Keywords/Search Tags:ICN, Abnormal detection, Safety, Routing
PDF Full Text Request
Related items