WEI Yujun,HE Haitao,ZHAO Qiong,et al.Traceback analysis of abnormal access to electronic resources from the perspective of encrypted traffic[J].Journal on Communications,2024,45(Z2):44-51.
WEI Yujun,HE Haitao,ZHAO Qiong,et al.Traceback analysis of abnormal access to electronic resources from the perspective of encrypted traffic[J].Journal on Communications,2024,45(Z2):44-51. DOI: 10.11959/j.issn.1000-436x.2024258.
Traceback analysis of abnormal access to electronic resources from the perspective of encrypted traffic
To trace the misuse of university library electronic resources
such as excessive downloading and frequent access
the Sun Yat-sen University traffic big data analysis platform was leveraged to analyze abnormal access behaviors from the perspective of encrypted traffic. Relevant network traffic indicators were discussed and a methodology for tracing abnormal access incidents was proposed. The findings demonstrate that the characteristics of encrypted traffic can effectively identify abnormal access behaviors
and the Sun Yat-sen University traffic big data analysis platform provides technical support to ensure the proper use of electronic resources.
XIAO A X . The causes and countermeasures for excessive downloading of electronic resources in university library [J ] . Journal of Library and Information Science , 2018 , 3 ( 2 ): 29 - 32 .
ZOU R , ZHANG C Y , JIANG A R , et al . Design and application of electronic resources access management and control system [J ] . Library and Information Service , 2010 , 54 ( 1 ): 121 - 124 .
SHAO J , YAN X D , ZHOU Q , et al . The demands analysis and the solution for the electronic resources usage control [J ] . Journal of Academic Libraries , 2012 , 30 ( 4 ): 11 - 13 .
WANG Z J , YU X Y , JIN Y L . Using sniffer technology to constraint electronic resource excessive downloading [J ] . New Technology of Library and Information Service , 2015 ( 12 ): 95 - 100 .
LEI D S , GUO Z Y . Research on abnormal access to electronic resources based on EZproxy logs [J ] . Journal of Modern Information , 2016 , 36 ( 7 ): 101 - 106 .
C. Fu , Q. Li , and K. Xu . Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis [C ] . In Proc. NDSS , 2023 .
FU C P , LI Q , XU K . Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis [C ] // Proceedings 2023 Network and Distributed System Security Symposium . Reston, VA : Internet Society , 2023 : 1 - 18 .
YANG M , HE H T , ZHAO Q . Design and implementation of traffic big data security analysis platform [J ] . Journal on Communications , 2018 , 39 ( S1 ): 104 - 109 .