期刊文献+

基于AOI方法的未知蠕虫特征自动发现算法研究 被引量:2

An Automatic Worm Signature Extraction Algorithm Based on Attribution-Oriented Induction Method
下载PDF
导出
摘要 近年来频繁爆发的大规模网络蠕虫对Internet的整体安全构成了巨大的威胁,新的变种仍在不断出现。由于无法事先得到未知蠕虫的特征,传统的基于特征的入侵检测机制已经失效。目前蠕虫监测的一般做法是在侦测到网络异常后由人工捕获并进行特征的分析,再将特征加入高速检测引擎进行监测。本文提出了一种新的基于面向属性归纳(AOI)方法的未知蠕虫特征自动提取方法。该算法在可疑蠕虫源定位的基础上进行频繁特征的自动提取,能够在爆发的早期检测到蠕虫的特征,进而通过控制台特征关联监测未知蠕虫的发展趋势。实验证明该方法是可行而且有效的。 The frequent explosion of massive worm propagation becomes a huge threaten to Internet security and caused countless losses. The traditional signature based IDS fails to detect new worm due the absence of the ability to detect characteristic of unknown worms. Currently, worm monitoring worm traffic after the early-bird system detected anomaly worm mainly depends on artificial analysis on the captured traffic and put the signature into the high speed detection system. This paper proposed an automatic worm Signature extraction algorithm based on Attribution-Oriented Induction method. It can detect worm signature using a Hash method in the early stage of worm propagation and then track the worm spread trend through signature correlation in the control center of system. The subsequent experiment result shows that the algorithm is feasible and effective.
出处 《计算机科学》 CSCD 北大核心 2006年第7期127-130,137,共5页 Computer Science
基金 国家自然科学基金项目(90204008)
关键词 未知蠕虫 特征自动提取 面向属性归纳 Unknown worm species, Automatic signature extraction, AOI
  • 相关文献

参考文献13

  • 1Spafford E H. The Internet Worm:Crisis and Aftermath. Communications of the ACM, 1989,32(6):678-687
  • 2Chen Xuan, Heidemann John. Detecting Early Worm Propagation through Packet Matching: [Technical Report ISI-TR-2004-585].USC/Information Sciences Institute,Feb. 2004
  • 3Bakos G,Berk V. Early Detection of Internet Worm Activity by Metering ICMP Destination Unreachable Messages. In: Proceedings of the SPIE Aerosense,2002
  • 4Singh S, Estan C, Varghese G, Savage S. The EarlyBird System for Real-time Detection of Unknown Worms: [Technical Report CS2003-0761]. UCSD, 2003
  • 5Gu RongJie, Xia DeLin, Yan PuLiu. An Adaptive Internet Backbone Malicious Activies Detection System Based on Frequent Pattern Mining. [J] GESTS International Transactions on Computer Science and Engineering., 2005,12: 41- 148
  • 6Cai Y,Cercone N, Han J. Attribute-Oriented Induction in relational databases. In: G. Priatetsky-Shapiro and W.J. Frawley, eds.Knowledge Discovery in Databases, Cambrige, MA: AAAI/MIT,213-228
  • 7Han J, Cai Y, Cercone N. Data-driven discovery of quantitative rules in relational databases. IEEE Trans. Knowledge and Data Engineering, 1993 : 29-40 .
  • 8Han J, Fu Y. Discovery of multiple-level association rules from large databases. In:Proc. 1995 Int. Conf. Very Large Data Bases(VLDB' 95), 1995
  • 9Han Jiawei,Kamber Micheline. Data Mining Concepts and Techniques.[M] Canada: Morgan Kaufmann publishers
  • 10Julish K, Dacier M. Mining Intrusion Detection Alarms for Actionable Knowledge. In: The 8th ACM Int Conf. on Knowledge Discovery and Data Mining, Edmonton, 2002

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部