Netinfo Security ›› 2018, Vol. 18 ›› Issue (3): 78-85.doi: 10.3969/j.issn.1671-1122.2018.03.010

• Orginal Article • Previous Articles     Next Articles

A Trusted Connection Architecture Based on Network Behavior Analysis

Jianbiao ZHANG, Wanshan XU(), Guojie LIU, Fan YANG   

  1. Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
  • Received:2017-11-10 Online:2018-03-15 Published:2020-05-11

Abstract:

Trusted connection architecture (TCA) is an important means to solve the network security access. TCA through a trusted third party to achieve two-way user authentication and platform identification, greatly guarantee the terminal and access network security. TCA implements two-way user authentication and platform authentication through trusted third party, which greatly guarantees the security of the terminal and the network access. However, TCA does not consider the security of network behavior. In this regard, this paper proposes an extended TCA architecture, which extends the network behavior layer on the basis of TCA. It extracts network behavior based on time and host network traffic characteristics. Bayesian algorithm is used to achieve the network behavior analysis, measurement and identify the network abnormal behavior. Experiments show that the architecture can effectively identify the abnormal behavior in the network and protect the network security.

Key words: TCA, behavior analysis, Bayesian algorithm, network security

CLC Number: