期刊文献+

基于隐Markov模型的协议异常检测 被引量:7

Protocol Anomaly Detection Based on Hidden Markov Model
下载PDF
导出
摘要 入侵检测是网络安全领域的研究热点,协议异常检测更是入侵检测领域的研究难点.提出一种新的基于隐Markov模型(HMM)的协议异常检测模型.这种方法对数据包的标志位进行量化,得到的数字序列作为HMM的输入,从而对网络的正常行为建模.该模型能够区分攻击和正常网络数据.模型的训练和检测使用DARPA1999年的数据集,实验结果验证了所建立模型的准确性,同现有的基于Markov链(Markov chain)的检测方法相比,提出的方法具有较高的检测率. Protocol anomaly detection, a new technique of anomaly detection, has great research value. Its incorporation with hidden Markov model (HMM) is still in infancy. In order to investigate the capabilities of hidden Markov model in this area, a protocol anomaly detection model based on HMM is given in this work. Firstly, an overview of anomaly detection is presented with emphasis on the issues about protocol anomaly detection. Then, a novel protocol anomaly detection model based on HMM is proposed. This method filters incoming TCP traffic by destination ports and then quantizes network flags into decimal numbers. These numbers are classified into sequences which are used as inputs of HMMs by TCP connections. Detection models based on HMM representing normal network behaviors are trained by Baum-Welch method. Finally, the models' correctness and effectiveness is demonstrated by using forward method on MIT Lincoln Laboratory 1999 DARPA intrusion detection evaluation data set. Forward method is used here to compute the probability of a connection. Threshold K is designed to control detection rate. By comparing the probability with threshold K, this protocol anomaly detection model could find whether the traffic is normal or containing some sort of anomaly. Experimental results show that the model based on HMM has higher detection rates on attacks than the Markov chain detection method.
出处 《计算机研究与发展》 EI CSCD 北大核心 2010年第4期621-627,共7页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60442002) 北京交通大学校科技基金项目(2006XM007)~~
关键词 入侵检测 异常检测 协议异常检测 隐MARKOV模型 MARKOV链 intrusion detection anomaly detection protocol anomaly detection hidden Markov model (HMM) Markov chain
  • 相关文献

参考文献19

  • 1Balasubramaniyan J S,Garcia-Fernandez J O,Isacoff D,et al.An architecture for intrusion detection using autonomous agents[C]//Proc of the 14th Annual Computer Security Applications Conference.Los Alamitos,CA:IEEE Computer Society,1998:13-24.
  • 2穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 3Kumar D.Protocol anomaly detection for network-based intrusion detection[R/OL].GSEC Practical Assignment,Version 1.2f.(2001-08-13)[2008-10-23].http:///www.sans.org/reading_room/papers/? id=349.
  • 4Warrender C,Forrest S,Pearlmutter B.Detecting intrusions using system calls:alternative data models[C]//Proc of 1999 IEEE Symp on Security and Privacy.Piscataway,NJ:IEEE,1999:133-145.
  • 5Lemonnier E.Protocol Anomaly Detection in Network-based IDSs[EB/OL].Stockholm:Defcom.(2001-06-28)[2008-10-23].http://erwan.lemonnier.se/docs/protocol_anomaly_detection.pdf.
  • 6Beetle,Sasha.A strict anomaly detection model for IDS[J/OL].Phrack Magazine,2000,56(11).[2008-10-23].http://www.phrack.com/issues.html? issue=56&id=12.
  • 7Yoo I S.Protocol anomaly detection and verification[C]//Proc of the 2004 IEEE 5th Annual IEEE Workshop on Assurence and Security.Piscataway,NJ:IEEE,2004:74-81.
  • 8Abdullah I S,Menasce D A.Protocol specification and automatic implantation using XML and CBSE[C]//Proc of Int Conf on Communications,Internet and Information Technology.Calgary,AB:ACTA Press,2003:17-19.
  • 9高磊,张德运,Md Jahangir Alam,张军,胡国栋.基于Petri网的TCP协议异常检测模型[J].西安交通大学学报,2006,40(6):659-662. 被引量:4
  • 10Estevez-Tapiador J M,Garcia-Teodoro P,Diaz-Verdejo J E.Stochastic protocol modeling for anomaly based network intrusion detection[C]//Proc of IEEE IWIA'03.Piscataway,NJ:IEEE,2003:3-12.

二级参考文献14

  • 1穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 2Estevez-Tapiador J M, et al. Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. In:Proc. of the First IEEE Intl. Workshop on Information Assurance(IWIA'2003)
  • 3Warrender C, Forrest S, Pearlmutter B. Detecting Intrusions Using System Calls: Alternative Data Models. In: IEEE Symposium on Security and Privacy, 1999
  • 4Jha S, et al. Classifiers, and Intrusion Detection. In: 14th IEEE Computer Security Foundations Workshop(CSFW'01),June 2001
  • 5Gao B, et al (HMMS (HIDDEN MARKOV CHAIN MODELS)BASED ON ANOMALY INTRUSION DETECTION METHOD.In: Proc. of the First Conf. on Machine Learning and Cybernetics, Beijing, Nov. 2002. 381-385
  • 6Bykova M, Ostermann S, Tjaden B. Detecting Network Intrusions via Statistical Analysis of Network Packet Characteristics.In: Proc. of the 33rd southeastern Symposium on System Theory,2001
  • 7Paxson V. Bro: A System for Detecting Network Intruders in Real-Time. In: Proc. of the 7th USENIX Security Symposium San Antonio, Texas, Jan. 1998
  • 8Postel J. Transmission Control Protocol. RFC 793, Sep. 1981
  • 9Yoo I S.Protocol anomaly detection and verification[A].2004 IEEE Workshop on Information Assurance and Security,New York,2004.
  • 10Ultes-NitscheU,Yoo I S.Run-time protocolconformance verification in firewalls[A].4th Annual ISSA 2004 IT Security Conference,Johannesburg,South Africa,2004.

共引文献75

同被引文献60

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部