Analyzing the Long Memory for Traffic Data and Developing the Network Security System
碩士 === 國立屏東科技大學 === 工業管理系所 === 97 === Nowadays the internet is more and more convenient, but people will worry about the security when they are surfing the internet. If the website is attached by the hacker, it will reduce the efficiency of the network, and the speed will be slow down, even paralyz...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Online Access: | http://ndltd.ncl.edu.tw/handle/90907126351501830629 |
id |
ndltd-TW-097NPUS5041022 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097NPUS50410222016-12-22T04:11:43Z http://ndltd.ncl.edu.tw/handle/90907126351501830629 Analyzing the Long Memory for Traffic Data and Developing the Network Security System 網路流量之長記憶性與安全系統分析 Pan, Wei- Jiun 盤維鈞 碩士 國立屏東科技大學 工業管理系所 97 Nowadays the internet is more and more convenient, but people will worry about the security when they are surfing the internet. If the website is attached by the hacker, it will reduce the efficiency of the network, and the speed will be slow down, even paralyze the website. The worse thing is, your personal information will be stolen for the evil purpose. As a result, the network security is become the most important issue of Network Management. Practically, the network manager through observing the flow of organized or the unit network, usually can find that if the use of population, habit, and network system did not have the great changes, basically the flow of network will appear a kind of similarity cycle and a specific pattern. This study is based on the flow history, and use the theory of quality control statistics, to build the appropriate control chart. Offer the network manager a tool to control the change of network flow, and expect can detect the unusual condition in advance. However, traditional control chart data products with the assumption that the same independent identical the normal distribution, but the network traffic information is clearly with the traditional control chart does not match the assumptions, with autoregressive features even of long memory. In this paper, first of all, the history of a site to collect traffic information, the use of Hurst's index to verify whether the information has a long memory, and network traffic with Hurst parameters results validate the distinction between, respectively, fitting the appropriate autoregressive integrated moving-average(ARIMA) and autoregressive fractional moving-average(ARFIMA), the model will be fitted to monitor network traffic parameters used to construct time series of abnormal control chart. Wu, Ji-Cheng 吳繼澄 學位論文 ; thesis 118 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立屏東科技大學 === 工業管理系所 === 97 === Nowadays the internet is more and more convenient, but people will worry about the security when they are surfing the internet. If the website is attached by the hacker, it will reduce the efficiency of the network, and the speed will be slow down, even paralyze the website. The worse thing is, your personal information will be stolen for the evil purpose. As a result, the network security is become the most important issue of Network Management. Practically, the network manager through observing the flow of organized or the unit network, usually can find that if the use of population, habit, and network system did not have the great changes, basically the flow of network will appear a kind of similarity cycle and a specific pattern. This study is based on the flow history, and use the theory of quality control statistics, to build the appropriate control chart. Offer the network manager a tool to control the change of network flow, and expect can detect the unusual condition in advance. However, traditional control chart data products with the assumption that the same independent identical the normal distribution, but the network traffic information is clearly with the traditional control chart does not match the assumptions, with autoregressive features even of long memory. In this paper, first of all, the history of a site to collect traffic information, the use of Hurst's index to verify whether the information has a long memory, and network traffic with Hurst parameters results validate the distinction between, respectively, fitting the appropriate autoregressive integrated moving-average(ARIMA) and autoregressive fractional moving-average(ARFIMA), the model will be fitted to monitor network traffic parameters used to construct time series of abnormal control chart.
|
author2 |
Wu, Ji-Cheng |
author_facet |
Wu, Ji-Cheng Pan, Wei- Jiun 盤維鈞 |
author |
Pan, Wei- Jiun 盤維鈞 |
spellingShingle |
Pan, Wei- Jiun 盤維鈞 Analyzing the Long Memory for Traffic Data and Developing the Network Security System |
author_sort |
Pan, Wei- Jiun |
title |
Analyzing the Long Memory for Traffic Data and Developing the Network Security System |
title_short |
Analyzing the Long Memory for Traffic Data and Developing the Network Security System |
title_full |
Analyzing the Long Memory for Traffic Data and Developing the Network Security System |
title_fullStr |
Analyzing the Long Memory for Traffic Data and Developing the Network Security System |
title_full_unstemmed |
Analyzing the Long Memory for Traffic Data and Developing the Network Security System |
title_sort |
analyzing the long memory for traffic data and developing the network security system |
url |
http://ndltd.ncl.edu.tw/handle/90907126351501830629 |
work_keys_str_mv |
AT panweijiun analyzingthelongmemoryfortrafficdataanddevelopingthenetworksecuritysystem AT pánwéijūn analyzingthelongmemoryfortrafficdataanddevelopingthenetworksecuritysystem AT panweijiun wǎnglùliúliàngzhīzhǎngjìyìxìngyǔānquánxìtǒngfēnxī AT pánwéijūn wǎnglùliúliàngzhīzhǎngjìyìxìngyǔānquánxìtǒngfēnxī |
_version_ |
1718402611093176320 |