期刊文献+

网络设备协同联动模型 被引量:17

A Model of Network Device Coordinative Run
下载PDF
导出
摘要 在开放的互联网环境下,大规模分布式网络恶意行为日益增多.发生在不同地理位置、不同时间段的安全事件可能存在潜在的隐藏关系.作者基于通用图灵机思想,提出了一个处理大规模网络安全事件的协同联动模型(Coordinative Running Model,CRM).在形式定义的基础上,从人机交互角度分析模型层次结构,由不同部件构建模型系统结构,并实现了面向基础网络的协同联动系统(Coordinative Running System,CRS),且与基于安全域的安全操作中心(Security Operating System,SOC)模型进行了对比分析.在僵尸网络的检测和追踪、DDoS攻击事件关联以及僵尸网络与DDoS攻击源关系分析三个应用实例中,CRS协调骨干网上不同类型安全设备共同工作.典型数据的分析结果表明,CRS为分析不同时间及不同空间安全事件之间关系,挖掘各事件关联后的更深层次安全隐患提供了有力平台. Internet is an open network environment,large-scale distributed malicious behaviors is increasing day by day on the internet.Potential relationships may exist among network security incidents which occur at different positions and time.In order to deal with those troubles,this paper presents a Coordinative Running Model(CRM) based on Universal Turing Machine.Formal mathematical definition of the model is proposed.Architecture of the model is hierarchy,and the model consists of several important components,which include storage component,interface system and coordinative running engine etc.On the basis of the above work,a Collaborative Running System(CRS) is implemented for analyzing distributed incidents of backbone network.Furthermore,this model is compared with the Security Operation Center(SOC).For three application scenarios,namely botnet tracking,correlation analysis for alerts of Distributed Denial-of-Service(DDoS) attack and relationship analysis between DDoS attack source and botnet,different types of monitoring devices of the backbone network work together through CRS.The analysis results of typical security incidents data show that CRS is efficient and effective to collaboratively analyze the relations of large-scale security incidents at different time and space,and CRS is a powerful platform for analyzing hidden danger among different incidents.
出处 《计算机学报》 EI CSCD 北大核心 2011年第2期216-228,共13页 Chinese Journal of Computers
基金 国家自然科学基金(60703021 60873138) 国家"八六三"高技术研究发展计划项目基金(2007AA01Z444 2007AA01Z467 2007AA01Z474 2007AA010501) 博士后科研启动金(LBH-Q08124)资助
关键词 网络安全 协同联动 图灵机 DDOS 僵尸网络 network security coordinative running turing machine DDoS botnet
  • 相关文献

参考文献16

  • 1Snapp S R,Brentano J,Dias G V,Goan T L,Heberlein L T,Ho C L,Levitt K N,Mukherjee B,Smaha S E,Grance T,Teal D M,Mansur D.DIDS(distributed intrusion detection system) --Motivation,architecture,and an early prototype//Proeeedings of the 14th National Computer Security Conference.Washington D.C.,1991,167-176.
  • 2White G B,Fisch E A,Pooch U W.Cooperating security managers:A peer-based intrusion detection system.IEEE Network,1996,10(1):20-23.
  • 3Porras P A,Neumann P G.EMERALD,Event monitoring enabling responses to anomalous live disturbances//Proceedings of the 12th National Computer Information Systems Security Conference.Baltimore,Maryland,USA,1997:353-365.
  • 4Asaka M,Taguchi A,Goto S.The implementation of IDA:An intrusion detection agent system//Proceedings of the 11th Annual FIRST Conference 1999.Brisbane,AU,1999:146-160.
  • 5Cuppens F.Cooperative intrusion detection//International Symposium on Information Superiority:Tools for Crisis and Conflict-Management.Paris,France,2001,262-274.
  • 6Cuppens F.Managing alerts in a multi-intrusion detection environment//Proceedings of the 17th Annual Computer Security Applications Conference.New Orleans,USA,2001:22.
  • 7Renaud Bidou.Security operation center concepts & implementation,http://www.iv2-technologies,com/~ rbidou/SOC Concept And Implementation.pdf,August 1,2005.
  • 8Dagon D,Zou C,Lee W.Modeling bother propagation using time zones//Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006).San Diego,CA,2006s 235-249.
  • 9Sipser M.Introduction to the Theory of Computation.2nd Edition.Boston MA USA,Course Technology,1997.
  • 10Turing A M.On computable numbers,with an application to the Entscheidungsproblem.Proceedings of the London Mathematical Society,1936,42(2):230-265.

二级参考文献4

共引文献156

同被引文献241

引证文献17

二级引证文献149

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部