《Tab.1 Overview of different detection methods》

《Tab.1 Overview of different detection methods》   提示:宽带有限、当前游客访问压缩模式
本系列图表出处文件名:随高清版一同展现
《基于网络行为特征与Dezert-Smarandache理论的P2P僵尸网络检测(英文)》


  1. 获取 高清版本忘记账户?点击这里登录
  1. 下载图表忘记账户?点击这里登录

To verify the accuracy of the proposed detection method in different situations,w ithout loss of generality,w e select four groups of data to compare the false negative and false positive rate of the proposed method w ith other detection methods show n in Tab.1,w hich use different combination of protocols and netw ork traffic rates,particularly the variation of traffic intensity in P2P programs.The 1st and 2nd samples are in the netw ork scenarios w ithout bot programs,and the 2nd and 4th samples contain a number of packets from P2P programs and other w eb applications.With the help of the method proposed in Ref.[27],the 3rd sample is acquired by merging the1st sample w ith the bot data captured from the netw ork scenarios show n in Fig.4,and the 4th sample is acquired by merging the 2nd sample w ith the bot data captured from the netw ork scenarios show n in Fig.4.The real attack times for the four groups of data are 0,0,1 000,and 1 000 in order.