期刊文献+

网络安全防护中高密度入侵频率监测方法仿真

Attack Intent Prediction Simulation under Abnormal Internet Intrusion in Mobile Internet
下载PDF
导出
摘要 对网络高密度入侵频率的监测,能够有效提高移动网络安全防护效果。在网络安全防护中对高密度入侵频率的监测,需要对入侵频率监测最短路径进行定量分析,通过维特比算法修正监测结果,完成高密度入侵频率的高精度监测。传统方法入侵告警映射识别已发生的安全防护,依据入侵攻击者能力等级调监测分布,但忽略了对监测结果的修正,导致监测精度偏低。提出基于改进隐马尔科夫模型的网络防护下高密度入侵频率监测方法。采用网络异常入侵攻击路径图对入侵意图可达性、实现几率以及监测最短路径进行定量分析。利用修正的概率计算方法降低高密度入侵频率监测误差,对于入侵告警信息时间序列中存在的误报情况,采用维特比算法通过添加一个判决门限对存在误报情况下的高密度入侵频率监测结果进行修正。实验结果表明,所提方法相比当前监测方法有效提高了高密度入侵频率监测的准确性。 To monitor high -density intrusion frequency can effectively improve the effect of protecting security of mobile network. In traditional methods, the correction of monitoring result is ignored, which leads to low monitoring accuracy. Therefore, this paper proposed a method to monitor high - density intrusion frequency in network protection based on improved hidden Markov model. We used the route map of network anomaly intrusion attack to quantitatively analyze the accessibility of intrusion intention, the implementation probability and the shortest path. Then, we used the modified probability method to reduce the error of high - density intrusion frequency monitoring. For the misinformation in time series of intrusion alarm information, the viterbi algorithm after adding a decision threshold was used to modify the monitoring result of high - density intrusion frequency in the case of misinformation. Simulation resuhs show that the proposed method effectively improves the accuracy of monitoring high - density intrusion frequency.
作者 王勇杰 张铁宝 WANG Yong - jie, ZHANG Tie - bao(Business College, Shanxi University, Taiyuan Shanxi 030031, China)
出处 《计算机仿真》 北大核心 2018年第10期321-324,共4页 Computer Simulation
基金 山西省教育科技规划项目基金(GH-15089)
关键词 安全防护 高密度 入侵频率 监测方法 Safety protection High - density Intrusion frequency Monitoring method
  • 相关文献

参考文献10

二级参考文献80

  • 1程叶霞,姜文,薛质,程叶坚.基于攻击图模型的多目标网络安全评估研究[J].计算机研究与发展,2012,49(S2):23-31. 被引量:9
  • 2宋磊,罗其亮,罗毅,涂光瑜.电力系统实时数据通信加密方案[J].电力系统自动化,2004,28(14):76-81. 被引量:30
  • 3ASK M, BONDARENKO P, REKDAL J E, et al. Advanced persistent threat (APT) beyond the hype[R]. Norway: Gjovik University College, 2012.
  • 4LI F, LAI A, DDL D. Evidence of advanced persistent threat: a case study of malware for political espionage[C]// Proceedings of the 2011 6th International Conference on Malicious and Unwanted Software (MALWARE). Fajardo: IEEE Computer Society, 2011: 102-109.
  • 5CHEN P, DESMET L, HUYGENS C. A study on advanced persistent threats[C]//Communications and Multimedia Security. Berlin, Heidelberg: Springer, 2014: 63-72.
  • 6TANKARD C. Advanced persistent threats and how to monitor and deter them[J]. Network Security, 2011(8): 16-19.
  • 7COLE E. Advanced persistent threat: Understanding the danger and how to protect your organization[M]. Netherlands: Elsevier, 2012.
  • 8GIURA P, WANG W. A context-based detection framework for advanced persistent threats[C]//Proceedings of the 2012 ASE International Conference on Cyber Security. Alexandria: IEEE Computer Society, 2012: 69-74.
  • 9ZHAO W, WANG P, ZHANG E Extended petri net-based advanced persistent threat analysis model[C]//Proceedings of the 2013 International Conference on Computer Engineering and Network. Heidelberg: Springer, 2014: 1297-1305.
  • 10HUTCHINS E M, CLOPPERT M J, AMIN R M. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains[C]//Proceedings of the 6th International Conference on Information Warfare and Security. Washington: Curran Associates Inc, 2011: 113-125.

共引文献85

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部