Behavior Spectrum: An Effective Method for User's Web Access Behavior Monitoring and Measurement

被引:0
作者
Qin, Tao [1 ]
Li, Wei [1 ]
Guan, Xiaohong
Liu, Zhaoli [1 ]
机构
[1] MOE Key Lab Intelligent Networks & Network Secur, Xian, Peoples R China
来源
2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2012年
关键词
Traffic Measurement; Behavior Spectrums; Web Service; Users' Behavior Monitoring;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the number of Internet users and applications continues to grow, it becomes increasingly important to understand the users' behavior character for efficient network management and security monitoring. Web is one of the most popular applications, which can help users to obtain anything they want. In this paper, we propose a new framework to measure and monitor users' web access behavior character. Firstly, web services are divided into 12 types according to the content they provide. As user like to access different web services at different time instants, we proposed the behavior spectrum to describe the users' access character in an easily understandable way. Secondly, we employ three traffic features ( number of connections, number of packets and number of bytes) to measure the intensity of users' access behavior. Based on the spectrums and features obtained, two kinds of user's access characters are analyzed: the characters at a particular time instant and the dynamic changing characters at continuous time points. Finally, we employ the Renyi entropy to cluster the users into different groups based on the spectrum and find the results are useful for network management. To verify the method, several actual traffic traces are collected from the Northwest Regional Center of CERNET (China Education and Research Network) and the experimental results prove the efficiency of the proposed methods.
引用
收藏
页码:961 / 966
页数:6
相关论文
共 10 条
[1]  
Aiello W, 2005, LECT NOTES COMPUT SC, V3431, P83, DOI 10.1007/978-3-540-31966-5_7
[2]  
[Anonymous], P PASS ACT MEAS C 20
[3]  
[Anonymous], 2010, P INT AAAI C WEB SOC, DOI DOI 10.1609/ICWSM.V4I1.14033
[4]  
John W, 2007, IMC'07: PROCEEDINGS OF THE 2007 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, P111
[5]  
Keys K., 2001, P 2 PASS ACT MEAS WO
[6]  
Kwak H., WWW'10, DOI DOI 10.1145/1772690.1772751
[7]  
Liu H, 2007, INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, P155
[8]  
Mcdaniel S., 2006, NDSS, V6, P1
[9]  
Tan G, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE GENERAL TRACK, P15
[10]   Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data [J].
Wang, Wei ;
Guan, Xiaohong ;
Zhang, Xiangliang ;
Yang, Liwei .
COMPUTERS & SECURITY, 2006, 25 (07) :539-550