检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:石志凯 朱国胜 雷龙飞 陈胜 镇佳 吴善超 吴梦宇 SHI Zhi -kai1, ZHU Guo -sheng1,2, LEI Long- fei1, CHEN Sheng1, ZHEN Jia1, WU Shan -chao1, WU Meng- yu(School of Computer and Information Engineering, Hubei University,Wuhan 4300G2 ,China) (Hubei Province Engineering Technology Research (;enter for Education Informationization,Wuhan 430062, China)
机构地区:[1]湖北大学计算机与信息工程学院,武汉430062 [2]湖北省教育信息化工程技术研究中心,武汉430062
出 处:《计算机科学》2018年第B06期323-327,共5页Computer Science
基 金:赛尔网络下一代互联网技术创新项目(NGII20150101)资助
摘 要:网络地址转换NAT对外网隐藏了内网的结构,这一方面给非法终端隐匿接入提供了便利,对网络造成潜在威胁;另一方面,用户也可通过NAT私自共享网络,直接损害网络运营者的利益。有效检测NAT设备,对网络安全管控、运营管理具有重要作用。文中对现有NAT检测技术进行了分析与比较,阐述了各自的优缺点和适用条件;提出了一种利用上层应用的特征和训练数据构建C5.0决策树的NAT设备检测方法。真实网络环境下的实验表明,所提方法能有效识别NAT设备。NAT hides the internal network structure to the external network.On the one hand,it offers access to the illicit terminal facilitates,causing potential threats to the network.On the other hand,users can also privately share networks through NAT,which directly harm the interests of network operators.Effective detecting NAT devices plays an important role in network security and controlling,network operation and management.This article analyzed and compared the current NAT detection technologies.The advantages,disadvantages and the applicable conditions of each technologies were described.A C5.0 decision tree based NAT device detection method using features of the upper-level applications and training data was proposed in this paper.The experiments with real network traffic data show that the model can identify NAT device effectively.
分 类 号:TP181[自动化与计算机技术—控制理论与控制工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.38