Research on Abnormal Behavior Detection Technology of Launch Vehicle Controlled Network

Launch vehicle network as an extremely important national defense information system, is faced with the threat of information security because of the dynamic detection limitation of the traditional firewall, virus detection software and so on. In this paper, we choose evaluation index and establish the entropy weight combination model based on the exponentially weighted moving-average (EWMA) model and the echo state network (ESN) model, Finally, we select the actual traffic data of the network, verify the effectiveness of the sequential dynamic security detection model, and study the influence of different time window observation scale on anomaly detection.

[1]  Frank Feather,et al.  A case study of Ethernet anomalies in a distributed computing environment , 1990 .

[2]  Hu Da-min Research on the Comparison of Time Series Models for Network Traffic Prediction , 2009 .

[3]  Lu Yo A Network User's Abnormal Behavior Detection Approach Based on Selective Collaborative Learning , 2014 .

[4]  Wei-Jie Han,et al.  An anomaly traffic detection method based on the flow template for the controlled network , 2016, 2016 15th International Conference on Optical Communications and Networks (ICOCN).

[5]  Han Mi A Multivariate Time Series Prediction Model Based on Subspace Echo State Network , 2014 .

[6]  Clement N. Nyirenda,et al.  Echo state network-based radio signal strength prediction for wireless communication in Northern Namibia , 2017, IET Commun..

[7]  Qun-Yan Ding Improved BP Neural Network Controller Based on GA Optimization , 2017, 2017 International Conference on Smart Grid and Electrical Automation (ICSGEA).

[8]  Georg Helbing,et al.  Power Curve Monitoring with Flexible EWMA Control Charts , 2017, 2017 International Conference on Promising Electronic Technologies (ICPET).

[9]  Qian Ye,et al.  Network-Wide Anomaly Detection Method Based on Multiscale Principal Component Analysis , 2012 .

[10]  Peng Yong,et al.  Scenario fingerprint of an industrial control system and abnormally detection , 2016 .

[11]  Shang Ji Research on Abnormal Behavior Analysis of Modern Networking Security Architecture , 2015 .

[12]  Lei Zhao,et al.  An efficient entropy-based network anomaly detection method using MIB , 2014, 2014 IEEE International Conference on Progress in Informatics and Computing.