期刊文献+

基于传输层会话行为统计特征的恶意流量识别 被引量:2

Identify Malicious Traffic Based on Behavioral Statistics Characteristics of Transport Layer Session
下载PDF
导出
摘要 准确高效地在骨干网流量中识别各种恶意流量一直都是网络安全领域的热点需求.分析设计了一种使用8种传输层会话特征的恶意流量检测及识别方法,并结合数据包固定特征检测实现了一个恶意流量实时识别引擎.系统选取的会话双向数据包长度分布、不同字节出现频率、字节数据重用值和时间间隔等会话行为特征通用性强、协议区分度高,能够很好地支持系统的扩展性.实验结果表明采用该引擎的恶意流量识别系统对具体会话协议的识别只需要处理对应会话的前20-30个数据包,在保证较高识别准确率的同时,较好地满足了实时性的要求. Accurately and efficiently identifying malicious traffic in backbone traffic has always been a hot spot in the field of network security. The paper first proposes a method to detect and identify malicious traffic with a combination of eight kinds of transport layer session characteristics,then designs a real-time malicious traffic identification engine based on the combination of this method and packet fixed signatures. The general session behavioral characteristics in the system such as session bidirectional data packet length distribution, byte frequency, byte reoccurring value and time interval, have the high ability to distinguish the protocols, and can support the expansion of the system. Experimental results show that the malicious traffic identification system with this engine which just need the first 20-30 packets to identify a protocol, not only can ensure a highly accuracy of detection and identification,but also meet the realtime requirements.
作者 张伟 刘清
出处 《小型微型计算机系统》 CSCD 北大核心 2015年第5期959-963,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61272422 61202353)资助
关键词 恶意流量 传输层 会话特征 检测识别 malicious traffic transport layer session characteristics identification
  • 相关文献

参考文献16

  • 1Zuo Li-ming, Liu Er-gen, Xu Bao-gen,et al. Malicious code family feature extraction and analysis techniques [ J ]. The Journal of Hua- zhong University of Science and Technology: Natural Science, 2010,38(4) :46-49.
  • 2Xu Xiao-lin, Yun Xiao-chun, Zhou Yong-lin ,et al. Based on cluste- ring model features massive online automated analysis of malicious code [J]. Communications,2013,34(8) :146-153.
  • 3Guo Dan-hna, Laxmi Narayan Bhnyan, Liu Bin. An efficient parallelized L7-filter design for multicore servers [ J ]. IEEE/ACM Transactions on Networking, 2012,20 ( 5 ) : 1426 -1439.
  • 4Josep Sanjuts-Cuxart, Pere Barlet-Ros, Josep Sol-Pareta. Measure- ment based analysis of one-click file hosting services [ J ]. Journal of Network and Systems Management,2012,20 (2) :276-301.
  • 5Mehran,Ramin,Alexis Oyama,et al. Abnormal crowd behavior detec- tion using social force model[ C]. Computer Vision and Pattern Recog- nition,CVPR 2009,IEEE. Conference on. IEEE ,2009:935-942.
  • 6Hjelmvik, Erik, Wolfgang John. Breaking and improving protocol obfuscation [ R ]. Chalmers University of Technology, Tech. Rep, 2010,123751.
  • 7Zimmermann, Hubert. OSI reference model-the ISO model of ar- chitecture for open systems interconnection [ J ]. Communications, IEEE Transactions on, 1980,28 ( 4 ) :425-432.
  • 8Documentation of spid attribute-meters [ EB/OL ]. http ://source- forge, net/apps/mediawiki/spid/index, php? title = AttributeMe- ters,2013.
  • 9Foithong, Sombut, Ouen Pinngem, et al. Feature subset selection wrapper based on mutual information and rough sets [ J ]. Expert Systems with Applications,2012,39( 1 ) :574-584.
  • 10Bermejo,Pablo, et al. Fast wrapper feature subset selection in high- dimensional datasets by means of filter re-ranking[ J]. Knowledge- Based Systems,2012,25( 1 ) :35-44.

二级参考文献26

  • 1苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811. 被引量:17
  • 2李晓勇,左晓栋,沈昌祥.基于系统行为的计算平台可信证明[J].电子学报,2007,35(7):1234-1239. 被引量:35
  • 3EGELE M, SCHOLTE T, KIRDA E, et al. A survey on automated dynamic malware-analysis techniques and tools[J]. ACM Computing Surveys (CSUR), 2012, 44(2): 1-42.
  • 4KEPHART J O, ARNOLD W C. Automatic extraction of computer virus signatures[A]. Proceedings of the 4th Virus Bulletin Intemational Conference[C] 1994.178-184.
  • 5SATHYANARAYAN V S, KOHLI P, BRUHADESHWAR B. Signa- ture generation and detection of malware families[A]. Information Security and Privacy[C]. Springer Berlin Heidelberg, 2008. 336-349.
  • 6SATISH S, PEREIRA S. Behavioral Signature Generation Using Clustering: WIPO Patent 2011137083[P]. 2011.
  • 7KOLBITSCH C, COMPARETTI P M, KRUEGEL C, et al. Effective and efficient malware detection at the end host[A]. Proceedings of the 18th Conference on USENIX Security Symposium USENIX Association[C]. 2009.351-366.
  • 8RAMACHANDRAN A, FEAMSTER N. Understanding the network-level behavior of spammers[J]. ACM Sigcomm Computer Communication Review, 2006, 36(4):291-302.
  • 9INOUE D, YOSHIOKA K, ETO M, et al. Malware behavior analysis in isolated miniature network for revealing malware's network activity[A]. IEEE International Conference on Communications[C]. 2008. 1715-1721.
  • 10MORALES J A, AL-BATAINEH A, XU S, et al. Analyzing and exploiting network Communication 20-34. behaviors of malware[A]. Security and Privacy in Networks[C]. Springer Berlin Heidelberg, 2010.

共引文献18

同被引文献13

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部