期刊文献+

多源攻击模式图入侵检测方法 被引量:5

Multi-source attack pattern graph intrusion detection algorithm
下载PDF
导出
摘要 针对入侵检测分析方法中因IDS误报漏报,无法完整还原整个攻击场景的问题,提出一种基于多源日志分析的入侵检测方法。使用PrefixSpan算法对序列化后的攻击过程序列数据进行频繁模式挖掘,构建多源攻击模式图;当网络中产生新警告时,按警告所属设备在攻击模式图中进行攻击模式匹配,匹配成功后采用可疑攻击识别算法构建可疑攻击模式图,发现新的攻击过程。实验结果表明,该方法在进行攻击场景还原时还原率高于其它方法,对未知攻击过程具有一定检测能力。 Because intrusion detection analysis can not fully restore the attack scenario construction which is caused by IDS misinformation and false report,an intrusion detection method based on the analysis of heterogeneous event log was put forward.The algorithm of PrefixSpan to make frequent patterns mining and build heterogeneous attack pattern diagrams was used.When new alert appeared,an attack pattern matching in the attack pattern diagrams based on the equipment where the alert came from was made by the computer,so as to find new attacking process.Experimental results show when restoring attack scenarios,the restoration rate of this method is higher than the other methods.Meanwhile,some unknown attacking processes can also be detected to some extent.
作者 张礼哲 顾兆军 何波 刘树发 ZHANG Li-zhe GU Zhao-jun HE Bo LIU Shu-fa(Information Technology Security Evaluation Center, Civil Aviation University of China, Tianjin 300300, China College of Computer Science and Technology, Civil Aviation University of China, Tianjin 300300, China Network Security Department, Tianjin Municipal Public Security Bureau, Tianjin 300020, China)
出处 《计算机工程与设计》 北大核心 2016年第11期2909-2916,共8页 Computer Engineering and Design
基金 民航局科技基金项目(MHRD20140205 MHRD20150233) 民航局安全能力建设资金基金项目(PDSA0008) 民航安全基金项目(PESA0001) 中央高校基本科研业务费中国民航大学专项基金项目(3122013Z008 3122013C004 3122015D025)
关键词 入侵检测 多源警告 警告日志 频繁模式 攻击模式图 intrusion detection multi-source alerts alert log frequent pattern attack pattern graph
  • 相关文献

参考文献5

二级参考文献46

  • 1穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 2林志贵,徐立中,严锡君,黄凤辰,刘英平.基于距离测度的D-S证据融合决策方法[J].计算机研究与发展,2006,43(1):169-175. 被引量:6
  • 3田俊峰,赵卫东,杜瑞忠,蔡红云.新的入侵检测数据融合模型——IDSFP[J].通信学报,2006,27(6):115-120. 被引量:15
  • 4HUANG Y S,SUEN C Y.A method of combining multiple experts for the recognition of unconstrained handwritten numerals[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1995,17(1):90-94.
  • 5MORIN B,ME L,DEBAR H,et al.A logic-based model to support alert correlation in intrusion detection[J].Information Fusion,2009,10(4):285-299.
  • 6LEE W,STOLFO S J.A framework for constructing features and models for intrusion detection systems[J].ACM Transactions on Information and System Security,2000,3(4):227-261.
  • 7GIACINTO G,ROLI F,DIDACI L.Fusion of multiple classifiers for intrusion detection in computer networks[J].Pattern Recognition Letters,2003,24(12):1795-1803.
  • 8MASLOV I V,GERTNER I.Multi-sensor fusion:an evolutionary algorithm approach[J].Information Fusion,2006,7(3):304-330.
  • 9Steven Silverman er al. Miniature thermal emissiom spectrometer for the Mars Exploration Rover [ J ]. 2006 Avants, laser focus world, 2011, (3).
  • 10Woo - Yong Jang, Maheed M Hayat, Demonstration ofBias- Controlled Algorithmic Tuning of Quantum Dots in a Well (DWELL) MidIR Detectors[J].IEEE Journal of quantum elec- tronics, June 2009,45 (6).

共引文献83

同被引文献32

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部