计算机科学 ›› 2016, Vol. 43 ›› Issue (Z6): 361-364.doi: 10.11896/j.issn.1002-137X.2016.6A.086

• 信息安全 • 上一篇    下一篇

手机流量非侵入式监测的决策树算法

易军凯,李正东,李辉   

  1. 北京化工大学信息科学与技术学院 北京100029,北京化工大学信息科学与技术学院 北京100029,北京化工大学信息科学与技术学院 北京100029
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受北京化工大学学科建设项目基金(XK1520)资助

Decision Tree Algorithm in Non-invasive Monitoring Cell Phone Traffic

YI Jun-kai, LI Zheng-dong and LI Hui   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对现有手机中不良软件难以监测和识别的问题,提出并实现了手机流量监测系统,采用非侵入式方法获取手机流量数据,根据特征采用ID3算法建立决策树模型,再根据此决策树规则对流量数据进行分类。实验结果表明:该方法对手机流量类型的识别准确率在92%以上。

关键词: 流量监测,决策树,流量特征,ID3算法

Abstract: The purpose of this paper is to solve the problem that it is difficult to monitor and identify the malicious software in the cell phone.Aiming at proposing and realizing a mobile traffic monitoring system,we used non-invasive method to get phone traffic data.A decision tree model was established using the ID3 algorithm for the data,and then the traffic data was classified according to the decision tree rule.The experiment results show that the method can identify the traffic flow generated by the cell phone and the recognition accuracy rate can reach more than 92%.

Key words: Traffic monitoring,Decision tree,Traffic features,ID3 algorithm

[1] 文伟平,梅瑞,宁戈,等.Android恶意软件检测技术分析和应用研究[J].通信学报,2014,35(8):78-85
[2] 杨欢,张玉清,胡予濮,等.基于多类特征的Android应用恶意行为检测系统[J].计算机学报,2014,37(01):15-27
[3] 周裕娟,张红梅,张向利,等.基于Android权限信息的恶意软件检测[J].计算机应用研究,2015,32(10)
[4] Carela-Espaol V,Barlet-Ros P,Bifet A,et al.A streaming flow-based technique for traffic classification applied to 12+1 years of Internet traffic[J].Telecommunication Systems,2015:1-14
[5] Divakaran D M,Su L,Liau Y S,et al.SLIC:Self-Learning Intelligent Classifier for Network Traffic[J].Computer Networks,2015,91:283-297
[6] Chen Z,Liu Z,Peng L,et al.A novel semi-supervised learning method for Internet application identification[J].Soft Computing,2015:1-13
[7] Groleat T,Arzel M,Vaton S.Stretching the Edges of SVMTraffic Classification With FPGA Acceleration[J].IEEE Transactions on Network & Service Management,2014,11(3):278-291
[8] Tegeler F,Fu X,Vigna G,et al.BotFinder:finding bots in network traffic without deep packet inspection[C]∥Proc Co-next.2012:349-360
[9] Wang B,Chua K C,Srinivasan V,et al.Information Coverage in Randomly Deployed Wireless Sensor Networks[J].IEEE Transactions on Wireless Communications,2007,6(8):2994-3004
[10] Narayanan V A,Sureshkumar V,Rajeswari A.Automatic Traffic Classification Using Machine Learning Algorithm for Policy-Based Routing in UMTS-WLAN Interworking[M]∥Artificial Intelligence and Evolutionary Algorithms in Engineering Systems.Springer India,2015:305-312

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!