期刊文献+

网络协议隐形攻击行为的聚类感知挖掘 被引量:2

Clustering perception mining of network protocol's stealth attack behavior
下载PDF
导出
摘要 深藏在网络协议中的隐形攻击行为日益成为网络安全面临的新挑战。针对现有协议逆向分析方法在协议行为分析特别是隐形攻击行为挖掘方面的不足,提出了一种新颖的指令聚类感知挖掘方法。通过抽取协议的行为指令序列,利用指令聚类算法对所有的行为指令序列进行聚类分析,根据行为距离的计算结果,从大量未知协议程序中快速准确地挖掘出隐形攻击行为指令序列。将动态污点分析和指令聚类分析相结合,在自主研发的虚拟分析平台Hidden Disc上分析了1 297个协议样本,成功挖掘出193个隐形攻击行为,自动分析和手动分析的结果完全一致。实验结果表明,该方案在效率和准确性方面对协议隐形攻击行为的感知挖掘都是理想的。 Deep stealth attack behavior in the network protocol becomes a new challenge to network security. In view of the shortcomings of the existing protocol reverse methods in the analysis of protocol behavior, especially the stealth at-tack behavior mining, a novel instruction clustering perception mining algorithm was proposed. By extracting the proto-col's behavior instruction sequences, and clustering analysis of all the behavior instruction sequences using the instruction clustering algorithm, the stealth attack behavior instruction sequences can be mined quickly and accurately from a large number of unknown protocol programs according to the calculation results of the behavior distance. Combining dynamic taint analysis with instruction clustering analysis,1 297 protocol samples were analyzed in the virtual analysis platform hidden disc which was developed independently, and 193 stealth attack behaviors were successfully mined, the results of automatic analysis and manual analysis were completely consistent. Experimental results show that,the solution is ideal for perception mining the protocol's stealth attack behavior in terms of efficiency and accuracy.
作者 胡燕京 裴庆祺 HU Yan-jing PEI Qing-qi(Network and Information Security Key Laboratory, Engineering University of CAPF, Xi'an 710086, China State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an 710071, China)
出处 《通信学报》 EI CSCD 北大核心 2017年第6期39-48,共10页 Journal on Communications
基金 国家自然科学基金资助项目(No.61373170 No.61402530 No.61309022 No.61309008)~~
关键词 协议逆向分析 隐形攻击行为 指令聚类 protocol reverse analysis,stealth attack behavior,instruction clustering
  • 相关文献

参考文献2

二级参考文献28

  • 1David Geer. Behavior-based security become the main-stream of network security. Computer, 2006, 39(3): 14-17
  • 2Forrest S. , Hofmeyr S. A. , Somayaji A. , Longstaff T. A.. A sense of self for unix processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, 1996, 120-128
  • 3Hofmeyr S. A. , Forrest S. , Somayaji A.. Intrusion detection using sequences of system calls. Journal of Computer Security,1998, 6(3): 151-180
  • 4Wepsi A. , Dacier M. , Debar H.. Intrusion detection using variable-length audit trail patterns. In: Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection, Springer-Verlag, London, UK, 2000, 110-129
  • 5Sekar R. , Bendre M. , Dhurjati D. , Bollineni P.. A fast automation-based method for detecting anomalous program behaviors. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, DC,USA, 2001, 144-149
  • 6Feng H. , Kolesnikov O. , Fogla P. , Lee W. , Gong W..Anomaly detection using call stack information. In:Proceedings of the 2003 IEEE Symposium on Security and Privacy,IEEE Computer Society, Washington, DC, USA, 2003, 62
  • 7Mihai Christodorescu, Somesh Jha. Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium, USENIX Association, Berkeley, CA, USA, 2003, 169-186
  • 8Wroblewski G.. A general method of program code obfuscation [Ph.D. dissertation]. Wroclaw University, Poland, 2002
  • 9Wagner David, Soto Paolo. Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the 9th ACMConference on Computer and Communications Security, Washington, USA, 2002, 255-264
  • 10Christopher Kruegel, Engin Kirda. Automating mimicry attacks using static binary analysis. In: Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, 2005, 161-176

共引文献13

同被引文献7

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部