期刊文献+

基于多序列联配的攻击特征自动提取技术研究 被引量:25

Automatic Generation of Attack Signatures Based on Multi-Sequence Alignment
下载PDF
导出
摘要 误用入侵检测系统的检测能力在很大程度上取决于攻击特征的数量和质量.该文提出一种基于多序列联配的攻击特征自动提取方法:首先将可疑的网络数据流转化为序列加入到可疑数据池中;通过聚类将这些序列分为若干类别;最后利用该文提出的多序列联配算法对同一类中的序列进行联配,并以产生的结果代表一类攻击的特征.该方法的核心是该文提出的两种序列联配算法:奖励相邻匹配的全局联配算法CMENW(Contiguous-Matches Encouraging Needleman-Wunsch)和层次式多序列联配算法HMSA(Hierarchical Multi-Sequence Align-ment).CMENW算法克服了Needleman-Wunsch算法易产生碎片的问题,使得连续的特征片段能够尽量地予以保留;HMSA算法以层次式策略对多序列进行联配,支持通配符,并带有剪枝功能.该方法可以自动地提取包括变形病毒和缓冲区溢出在内的新攻击的特征,其主要优点是:(1)产生的攻击特征包含位置相关信息,因而相对传统的方法结果更加准确;(2)具有良好的抗噪能力. The detection capability of misuse IDS is dependent on the number and quality of attack signatures. This paper presents an attack signatures automatic generation approach, based on multi-sequence alignment: The suspicious flows are transferred into sequences and added to a suspicious traffic pool; with clustering, these sequences are divided into several clusters; by exploiting the proposed sequence alignment algorithms, the sequences from certain cluster are aligned and one signature that represents one type of attack is generated. The point of the approach is a global alignment algorithm-CMENW (Contiguous-Matches Encouraging Needleman- Wunsch) and a multi-sequence alignment algorithm-HMSA (Hierarchical Multi-Sequence Alignment). By encouraging contiguous bytes to be aligned together, CMENW reduces the influence of fragments in the process of alignment; HMSA algorithm is characterized by wildcard characters supporting and pruning function. The main advantages of the authors' approach are. (1) The generated signatures consist of position information which is reserved during alignments; (2) Have robustness against noises.
出处 《计算机学报》 EI CSCD 北大核心 2006年第9期1533-1541,共9页 Chinese Journal of Computers
基金 国家自然科学基金(60573136) 国家"八六三"高技术研究发展计划项目基金(2005AA121570) 现代通信国家重点实验室基金(51436050605KG0102)资助.
关键词 攻击特征提取 入侵检测 序列联配 变形蠕虫 缓冲区溢出攻击 attack signatures generation intrusion detection sequence alignment polymorphic worms buffer overflow
  • 相关文献

参考文献16

  • 1Kreibich C. , Crowcroft J.. Honeycomb creating intrusion detection signatures using honeypots. In: Proceedings of the 2nd Workshop on Hot Topics in Networks (HotNets-Ⅱ), Cambridge, MA USA, 2003, 51-56
  • 2Wang K. , Stolfo S.. Anomalous payload-based network intrusion detection. In: Proceedings of the RAID, Sophia Antipolis,French Riviera, 2004, 201-222
  • 3Kim H. , Karp B.. Autograph: Toward automated, distributed worm signature detection. In: Proceedings of the USENIX Security, San Diego, CA, 2004, 271-286
  • 4Singh S. , Estan C. , Varghese G. , Savage S.. Automated worm fingerprinting. In: Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI), San Francisco, CA,2004,45-60
  • 5Yegneswaran V. , Giffin J. , Barford P. , Jha S.. An architecture for generating semantics-aware signatures. In: Proceedings of the USENIX Security, Baltimore, MD, 2005, 97-112
  • 6Tang Y. ,Chen S.. Defending against Internet worms: A signature-based approach. In: Proceedings of the INFOCOM,Miami, Florida, 2005,1384-1394
  • 7Needleman S. B. , Wunsch C. D.. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology, 1970, 48(3): 443-453
  • 8Smith T. , Waterman M: Identification of common molecular subsequences. Journal of Molecular Biology, 1981, 147 (1):195-197
  • 9Newsome J. , Karp B. , Song D.. Polygraph: Automatically generating signatures for polymorphic worms. In: Proceedings of the IEEE S&P 2005, Oakland, California, 2005, 226-241
  • 10Crandall J. R. , Wu S. F. , Chong F. T.. Experiences using Minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities. In.. Proceedings of the GI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment, Vienna, 2005, 32-50

同被引文献283

引证文献25

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部