Count_Bloom_Filter技术研究及应用-毕业(学术)论文设计.docVIP

  • 19
  • 0
  • 约3.05万字
  • 约 30页
  • 2018-12-03 发布于广西
  • 举报

Count_Bloom_Filter技术研究及应用-毕业(学术)论文设计.doc

论文 摘 要 Bloom Filter是Bloom在1970年提出的一种在可接收错误率范围之内利用Hash函数对时间和空间进行平衡折中的数据管理方法,主要涉及计算时间复杂度,占用空间大小和错误率三个因素,这种集合中特定元素存在与否判断的查询技术在现代网络中得到了很大的应用。 Counting Bloom Filter 使用计数器来替代Bloom Filter 中的比特位,从而对集合中的元素的频度进行测量,在具体的实现方法上有多层次、多Hash函数组和动态管理的计数器等许多具体形式。论文结合入侵检测方面内容提出了用Count Bloom Filter实现对一些常见网络攻击进行异常检测的模型系统。该系统基于Dos攻击原理,通过对数据包的特征提取,用Count Bloom Filter对特征值进行计数,然后由统计结果判断是否发生异常。 系统涉及到网络存储、Bloom Filter应用、网络攻击以及入侵检测等诸多方面的内容,且各方面紧密结合。论文将对所有相关方面做个简单介绍以方便读者了解课题背景及课题任务。最后论文将给出一个可以用于实践的模型 关键词: HASH ;CBF;特征提取;TCP数据包 ABSTRACT Bloom Filter was raised by Bloom in 1970 to propos a reception in the error rate within the scope of benefits Hash functions of time and space for a balanced compromise methods of data management, mainly involving complex computing time, the space size occupiedand and the error rate . The technology has been largely used in judging whether a specific element is in a set. Counting Bloom Filter uses counters to substitute the Bloom Filter bit spaces.Then it can be used to measure the frequency of the element in the set.There are many ways to implement such as multiple levels、multiple hash and Dynamic management of the Counters.For a computer getting into the network, every time it is receiving and sending data. Now the most common network attack is DoS such as sending a great numberm of data packets in a short period to occupancy the resource of main computer,and make it can not proces normal data. In this paper, the starting point for this. Papers achieve a network traffic monitoring system. When a data packet flow reaches a certain threshold value we can say that someone is attacking me.Paper uses the counter of CBF to count the TCP date packets. Taking into account only for Anomaly Detection ,this system can only count with port number of TCP data packet. Papers relating to network storage, Bloom Filter application, Network attacks and intrusion detection and many other aspects. At last,paper will give a model that can be used in reality. Keywords:HASH;C

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档