期刊文献+

一种基于同源行为分析的APT异常发现策略 被引量:3

A discovery strategy for APT anomaly based on homologous behavior analysis
下载PDF
导出
摘要 APT(advanced persistent threat)攻击的日益频繁对APT攻击行为的检测提出了更高的要求,对同源行为进行分析是尽早发现APT攻击行为的一种有效方法。针对数据量过大造成数据对比认证效率低下的难题,提出了借助数据标签技术,建立历史同源行为数据库,并将数据库存储到云端;依托Hadoop平台和MapReduce聚合计算能力,基于伪随机置换技术完成网络全流量并行检测,通过与数据库中的数据标签进行对比验证,来判断是否有APT攻击行为。测试结果表明,该方法可尽早从网络中发现APT异常行为,提高全数据流检测的效率。 As APT (advanced persistent threat) attacks are increasingly frequently, higher requirements for the detection of APT attacks were proposed. It was an effective method to early discover the attack behavior of APT based on homologous behavior analysis. Aiming at the problem of low efficiency of data authentication caused by excessive data, the historical behavior database with data label technology was established and the database was stored in the cloud. Relying on the Hadoop platform and the aggregate computing ability of MapReduee and the pseudorandom permutation technique, the whole traffic parallel detection of the network was realized. In order to determine whether there was a APT attack behavior, the detection of APT attacks was implemented by comparing the data labels in the database. Test results show that the proposed method can detect the abnormal behavior of APT from the network as soon as possibleand improve the efficiency of the whole data flow detection.
出处 《电信科学》 北大核心 2016年第1期82-87,共6页 Telecommunications Science
基金 国家自然科学基金资助项目(No.61100042) 湖北省自然科学基金资助项目(No.2015CFC867) 信息保障技术国防重点实验室基金资助项目(No.KJ-13-111)~~
关键词 APT防御 同源策略 实时检测 数据标签 伪随机置换 APT defense; homologous strategy; real-time detection; data label; pseudorandom permutation
  • 相关文献

参考文献9

  • 1CHEN P,DESMET L,HUYGENS C.A study on advanced persistent threats[C]//Proceedings of the 15th International Conference Conference on Communications and Multimedia Security,September 25-26,2014,Aveiro,Portugal.Berlin:Springer Press,2014:56-73.
  • 2NIKOS V,DIMITRI G.The big four-what we did wrong in advanced persistent threat detection[C]//Proceedings of International Conference on Availability,Reliability and Security,September2-6,2013,Washington DC,USA.New Jersey:IEEE Press,2013:248-254.
  • 3YANG G M Z,TIAN Z H,DUAN W L.The prevent of advanced persistent threat[J].Journal of Chemical and Pharmaceutical Research,2015,6(1):572-576.
  • 4杜跃进,翟立东,李跃,贾召鹏.一种应对APT攻击的安全架构:异常发现[J].计算机研究与发展,2014,51(7):1633-1645. 被引量:20
  • 5李凤海,李爽,张佰龙,宋衍.高等级安全网络抗APT攻击方案研究[J].信息网络安全,2014(9):109-114. 被引量:9
  • 6COLE E.Advanced Persistent Threat:Understanding the Danger and How to Protect Your Organization[M].Boca Raton:CRC Press,2012:1-280.
  • 7郑黎明,邹鹏,贾焰,韩伟红.网络流量异常检测中分类器的提取与训练方法研究[J].计算机学报,2012,35(4):719-729. 被引量:23
  • 8许婷.一种有效防范APT攻击的网络安全架构[J].信息安全与通信保密,2013,11(6):65-67. 被引量:9
  • 9SEJONG 0,SEOG P.Task-role-based access control model[J].Information System,2003(28):533-562.

二级参考文献37

  • 1RSA. RSA security brief: Mobilizing intelligent security operations for advanced persistent threats [OL]. 2011 [2013- 07-11]. http=//www, eme. corn/utilities/search, esp.
  • 2Tankard C. Advanced persistent threats and how to monitor and deter them[J]. Network Security, 2011 (8): 16-19.
  • 3Li F, Lai A, Ddl D. Evidence of advanced persistent threat: A case study of malware for political espionage [C] //Proc of the 6th Int Conf on Malicious and Unwanted Software (MALWARE 2011). Piscataway, NJ: IEEE, 2011:102-109.
  • 4Kurtz G. Operation aurora hit Google, others [OL]. 2010- 01-14 [2013-07-11]. http://siblog, mcafee, eomleto/operation-% E2.
  • 5McAfee Labs and McAfee Foundstone Professional Services. Protecting your critical assets: Lessons learned from operation Aurora [OL]. 2011-08-03 [2013-07-11]. http:// bit. Iy/xSDUXE.
  • 6McMillan R. Siemens: Stuxnet worm hit industrial systems [OL]. (2010-09-14) [2013-07-11]. http://www, computervcorld. com/s/article/9185419[SiemensStuxnetworm hit industrial systems.
  • 7Falliere N, Murchu L O, Chien E. W32. Stuxnet Dossier [OL]. (2011-03-09)[2013-07-12]. http://www, h4ekr, us/ library/Documents/ICS _ Events/Smxnet% 20Dossier% 20 (Symantec) %20vl. 4. pdf.
  • 8Langner R. Stuxnet: Dissecting a cyberwarfare weapon [J]. Security & Privacy, 2011, 9(3): 49-51.
  • 9Farwell J P, Rohozinski R. Stuxnet and the future of cyber war[J]. Survival, 2011. 53(1): 23-40.
  • 10CyberattaeksG E. Night dragon[OL]. (2011-02-10) [2013- 07-12]. http://www, mcafee, com/tw/aboutlnight-dragon. aspx.

共引文献47

同被引文献31

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部