期刊文献+

网络异常流量智能感知模型构建 被引量:4

Establishment of Intelligent Perception Model of Abnormal Network Traffic
原文传递
导出
摘要 为了实现网络流量特征的高效、准确检测,保障信息系统安全可靠运行,提出一种网络异常流量智能感知模型。分析了传统网络异常流量检测方法的局限性,研判了流量检测、风险评估等方面的关键技术,提出了由流量采集和甄别、数据清洗、数据管理、威胁分析和评估应用五大模块构成的智能感知模型,并形成流式建模设计。以网络流量数据统计为基础,保证模型可以应对各种来源数据的采集和分析任务;完备的数据清洗能力能够对多种设备产生的数据进行汇聚和关键性标注;高可靠的数据管理体系能够保障海量数据得以安全存储和及时计算;充分的威胁分析手段支撑了对异常数据的持续检测预警,识别出隐藏在数据背后的攻击事件并得到充分的刻画、追踪;细粒度的评估应用能力保证了风险态势评估、攻击告警响应和智能感知的实现和迭代更新。该模型全方位地实现了网络异常数据的智能感知,具有较强的稳定性、安全性、持续性,为网络安全管理提供了一定的参考依据。 In order to realize the efficient and accurate detection of network traffic characteristics and ensure the safe and reliable operation of the information system,an intelligent perception model of abnormal network traffic is proposed.The limitations of detection methods for abnormal traditional network traffic are analyzed,key technologies in terms of traffic detection and risk assessment is investigated,an intelligent perception model with 5 modules,i.e.traffic acquisition&distinguishment,data cleansing,data management,threat analysis and evaluation application is proposed,and a flow modeling design is formed.Based on the network traffic data statistics,models can guarantee data collection and analysis tasks from a variety of sources.Full data cleaning capabilities allow aggregating and labeling important data generated by multiple devices.A reliable data management system can guarantee a large amount of data to be safely stored and calculated in time.Sufficient threat analysis methods support continuous detection and early warning of anomalous data,allowing recognizing,fully characterizing and tracking attack events hidden behind the data.A fine-grained assessment and application capabilities guarantee the realization and iterative update on the risk situation assessment,attack alarm response and intelligent recognition.Such a model fully realizes intelligent recognition of abnormal network data,with strong stability,security,and continuity,providing a specific reference infrastructure for network security management.
作者 林昕 吕峰 姜亚光 毛炳强 LIN Xin;LV Feng;JIANG Ya-guang;MAO Bing-qiang(China Software Testing Center,Beijing 100048,China;Key Laboratory of General Technology for Safety and Reliability Evaluation of Industrial Control System,Ministry of Industry and Information Technology,Beijing 100048,China;PipeChina Oil and Gas Control Center,Beijing 100013,China)
出处 《工业技术创新》 2021年第3期7-14,共8页 Industrial Technology Innovation
关键词 网络异常流量 数据挖掘 流量检测 威胁分析 风险评估 智能感知 Abnormal Network Traffic Data Mining Traffic Detection Threat Assessment Risk Assessment Intelligent Perception
  • 相关文献

参考文献12

二级参考文献64

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2穆祥昆,王劲松,薛羽丰,黄玮.基于活跃熵的网络异常流量检测方法[J].通信学报,2013,34(S2):51-57. 被引量:20
  • 3付钰,吴晓平,严承华.基于贝叶斯网络的信息安全风险评估方法[J].武汉大学学报(理学版),2006,52(5):631-634. 被引量:39
  • 4韩靖,郭放,石金华.基于神经网络的网络流量监控的研究[J].微计算机信息,2007(18):87-89. 被引量:3
  • 5孙知信.网络异常流量识别与监控技术研究[M].北京:清华大学出版社.2010.
  • 6赵玉秀.异常流量对网络的影响及检测方法.科技信息,.
  • 7Lee W. A data mining framework for constructing features and models for intrusion detection systems: [dissertation of Doctor of Philosophy]. Columbia University, 1999.
  • 8Lee W, Stolfo S J. Data mining approaches for intrusion detection. the Seventh USENIX Security Symposium (SECURITY '98), San Antonio, TX, Jan. 1998.
  • 9Jacobson V, Leres C, McCanne S. tcpdump. Available via anonymous ftp to ftp. ee. lbl. gov, June 1989.
  • 10薛静锋 曹元大.基于贝叶斯分类的分组入侵检测技术研究[A]..第三届全国CSCW暨第一届全国AIN学术会议论文集[C].,2002..

共引文献143

同被引文献25

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部