normal network traffic 中文意思是什麼

normal network traffic 解釋
正常網路通信量
  • normal : adj 1 正常的,平常的,普通的;平均的。2 正規的,標準的,額定的,規定的。3 智力正常的,精神健全的...
  • network : n. 1. 網眼織物。2. (鐵路、河道等的)網狀系統,網狀組織,廣播網,電視網,廣播[電視]聯播公司。3. 【無線電】網路,電路。4. 【計算機】電腦網路,網。
  • traffic : n 1 交通,(人、車、船、飛機的)來往;交通量;運輸;運輸量;運輸業;旅客,貨物。2 交易,貿易 (in...
  1. The ids of the paper is network - based anomaly detection system. with the help of data mining technology, we bring forward a measure to describe the normal state of the network traffic and user behavior and extracting the useful rule from large network data. so we can establish the knowledge warehouse which describe the normal state of the network traffic and user behavior. the knowledge warehouse can be the standard in order to judge the normal state. we can find the dubitable connections according to account the state and anomly instances of connections

    論文在描述網路應用和用戶行為時採用數據挖掘技術從海量的網路數據中提取有用的規則,構建了一個描述正常狀態下的網路應用和用戶行為的規則集,這個規則集是用來判斷網路應用和用戶行為是否正常的標準,論文根據這個標準分析當前網路連接的異常情況,將可疑的連接找出來。
  2. First, realized a wegener - willie distribute based network traffic anomaly detection algorithm. we make use of wegener - willie distribute to analyze the inherent time - frequency distribution characteristics of the traffic flow signal. then according to the experience of analysis on historical flow, we construct a normal flow training sample aggregation and a abnormal flow training sample aggregation

    通過魏格納-威利分佈分析網路流量信號在時頻分佈上所反映出的內在特點,根據歷史流量的經驗構造正常流量和異常流量兩個訓練樣本空間,通過k最近鄰分類演算法將帶檢測流量信號的時頻分佈與訓練樣本進行比較,完成對檢測樣本的自動分類識別。
  3. Simulation shows the study is a valuable reference for advancing exploration of real - time traffic anomaly detection. for non - stationary traffic, a general method is proposed based on a separation of the non - stationary traffic into disjoint components corresponding to normal and anomalous network conditions

    通過計算隨機部分參數的邊緣分佈和殘差,從高維、非平穩流量中分離出包含異常的隨機部分,揭示了流量異常對隨機部分參數的影響。
  4. As a general rule, we recommend filtering all types of network traffic that are not required for normal operation

    根據良好的習慣,除日常操作需要的網路交通以外,其他的網路交通都應過濾。
  5. The engineer also observes a higher than normal amount of snmp traffic on the network

    同時,他還觀察到網路上snmp流量高於正常值。
  6. As the growth of the internet popularize intensity, network traffic anomalies, which are caused by network attacks, worm virus, malicious download, equipment failure, etc, increasingly impact the network performance, some unusual offensive flow disrupts the normal operation of the network order, poses a serious threat to network security. in such situations, how to detect the network traffic anomalies accurately and in time, ensure the normal operation of the network, provide users with a good network environment, become a topic of concern

    但是隨著網路的普及程度越來越高,由網路攻擊、蠕蟲病毒、惡意下載、設備異常等因素導致的網路流量異常對網路性能的影響越來越大,某些帶有攻擊性的異常流量干擾了正常的網路運行秩序,對網路安全造成了嚴重威脅。在這種情況下,如何及時而準確的檢測出網路流量異常,保證網路的正常運行,為用戶提供一個良好的網路環境成為一個備受關注的研究課題。
  7. The system goal to the s1240 program controlled switch telephone traffic reported carries on analysis processing, the telephone traffic reported reflected the telephone network movement unusual situation and the warning situation, withdraw from the massive normal data, further analyzes processing for the attendant, reduces attendant ' s working pressure, guarantees the maintenance work the standard unity

    本系統開發了s1240程式控制交換機話務報告日常工作處理模塊,減輕了維護人員日常維護工作量,保證維護工作的質量。本系統開發了s1240程式控制交換機話務報告話務高峰處理模塊,為進一步解決話務高峰時的維護問題打好基礎。
  8. Abstract network traffic anomaly refers to the status that traffic behaviors depart from the normal behaviors. many reasons, such as the misuse of network equipments, network operations anomaly, flash crowd, network intrusion and so on will cause network anomaly

    網路流量異常指的是網路的流量行為偏離其正常行為的情形,引起網路流量異常的原因是多種多樣的,例如網路設備的不良運行、網路操作異常、突發訪問( flashcrowd ) 、網路入侵等。
  9. We do researches on constructing normal model of network traffic, analysizing self - similarity of network traffics - hurst parameter, and its time variable function h ( t ). experimental analysis confirmed the validity of the novel mechanism, limiting the extent of network traffic in time and detecting the ddos attack through measuring the change of h parameter brought by the attacks. moreover we use database to refine the ddos attack

    主要成果為: ( 1 )對網路流量的自相似性? hurst參數、 hurst參數的時變函數h ( t )進行分析,建立正常網路流量模型,比傳統的特徵匹配更準確描述了網路流量的特性; ( 2 )通過實驗驗證了,基於正常網路流量模型,對網路流量進行實時限幅,由自相似性的變化來預測ddos攻擊方法的正確性; ( 3 )對于不同的攻擊方式,我們使用不同的方法進行檢測,並用數據庫對流經的包頭信息進行統計分析,來對攻擊定位。
  10. By adopting the real - time rescaled range ( rrs ) algorithm developed from the rs method, we do the simulation work using fractional gaussian noise ( fgn ) and real network traffic data collected from lan and wan. it shows the method we bring up can differentiate normal network traffic and ddos attack traffic effectively and precisely in most situation, and has provided a new way to detect and prevent ddos attack duly and precisely

    通過基於rs演算法改進的實時hurst系數估計演算法rrs ,採用分形高斯噪聲和局域網、廣域網真實業務數據進行了模擬實驗,結果表明本文所提出的方法可以在絕大多數情況下準確高效地區分正常網路業務和包含了ddos攻擊的數據業務,從而為及時、準確地判斷和制止大規模ddos攻擊的發生提供了新的手段。
分享友人