期刊文献+

利用改进的MajorClust算法实现异常用户行为定位 被引量:6

Using the Improved MajorClust Algorithm to Realize Unusual User Behavior Orientation
下载PDF
导出
摘要 传统入侵检测技术难以在发现异常入侵的同时,兼顾精准定位核心证据及线索的司法需求.MajorClust算法可以规避传统聚类算法需要事先给定聚类数量的缺陷,其侧重于对图形自身属性进行考量的特性为行为检测提供了崭新的思路.但在应用于行为证据发现时,经单次MajorClust算法处理得到的异常行为规律不够明显,也无法准确定位关键异常点.改进后的MajorClust算法在关联度计算基础上,经过多次迭代抽象处理更精准地梳理记录间关系,并通过在频率最高、到达率最高以及邻边权重之和最大这三种类型节点中合理选择簇核心点实现海量记录中核心异常行为的定位.没有沿袭传统的以单一异常参数进行异常检测的思路,而是基于行为间的关联特性连带次高异常参数予以综合判断,不同簇的核心节点信息相互印证,提升了检测结果的可信度. Traditional intrusion detection technology is difficult to find the abnormal intrusion while taking into account the judicial needs of accurately positioning core evidence and clues. MajorClust can circumvent the traditional clustering algorithm needs to give the number of clusters in advance,and its focus on the characteristics of the graph itself provides a new idea for behavior detection. However,when applied to the discovery of behavioral evidence,the abstract behavior of the abstracted MajorClust treatment is not obvious enough,and it is impossible to accurately locate the critical anomaly. Based on the correlation degree calculation,the improved MajorClust algorithm sorts the relationship between records more accurately after repeated iteration abstraction processing,and the core anomaly behavior in mass records is achieved by reasonably selecting cluster core points in the three types of nodes with the highest frequency,the highest arrival rate and the largest sum of adjacent edges. The traditional idea of abnormality detection with a single abnormal parameter is not followed,but based on the correlation characteristics between behaviors and the second highest anomaly parameters,the core node information of different clusters is mutually verified,which improves the credibility of the detection results.
作者 罗文华 张艳 LUO Wen-hua;ZHANG Yan(Criminal Investigation Police University of China,Cyber Crime Investigation Department,Shenyang 110035,China)
出处 《小型微型计算机系统》 CSCD 北大核心 2019年第11期2374-2379,共6页 Journal of Chinese Computer Systems
基金 公安部技术研究计划重点项目(2017JSYJA10)资助 公安部理论及软科学计划项目(2018LLYJXJXY016)资助 辽宁省社科基金项目(L18BFX009)资助 中国刑事警察学院研究生创新能力提升项目(2018YCZD04)资助
关键词 异常检测 聚类 MajorClust 相似度 信息定位 abnormal detection clustering majorClust similarity position of information
  • 相关文献

参考文献9

二级参考文献92

  • 1王双成,苑森淼.具有丢失数据的贝叶斯网络结构学习研究[J].软件学报,2004,15(7):1042-1048. 被引量:62
  • 2王开军,张军英,李丹,张新娜,郭涛.自适应仿射传播聚类[J].自动化学报,2007,33(12):1242-1246. 被引量:144
  • 3SUFATRIO, YAP R H C,Improving Host-based IDS with Argument Abstraction to Prevent Mimicry Attacks[J]. Recent Advances in Intrusion Detection,2006(3858):146-164.
  • 4CREECH G, HU J K.A Semantic Approach to Host-Based IntrusionDetection Systems Using Contiguous and Discontiguous System Call Patterns[J].IEEE Transactions on Computers, 2014,4(63): 807-819.
  • 5JOO D, HONG T, HAN I.The Neural Network Models for IDS Based on the Asymmetric Costs of False Negative Errors and False Positive Errors[J]. Expert Systems with Applications, 2003,1(25): 69-75.
  • 6ANDREOLINI M, COLAJANNI M,MARCHETTI M.A Collaborative Framework for Intrusion Detection in Mobile Networks[J]. Information Sciences, 2015(321): 179-192.
  • 7CORONA,G1ACINTO G,ROLI F.Adversarial Attacks Against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues[J]. Information Sciences, 2013(239):201-225.
  • 8GANAPATHY S, KULOTHUNGAN K,MUTHU1KAJKUMAR S,et al. Intelligent Feature Selection and Classification Techniques for Intrusion Detection in Networks: a Survey[J].Eurasip Journal on Wireless Communications and Networking, 2013(1):1-16.
  • 9BROUMAND, ESFAHANI M S,YOON B J, et al. Discrete Optimal Bayesian Classification with Error-conditioned Sequential Sampling[J], Pattern Recognition, 2015,11 (48):3766-3782.
  • 10KRISTJANPOLLER W, MINUTOLO M C. Gold Price Volatility: A Forecasting Approach Using the Artificial Neural Network-GARCH Model [.]].Expert Systems with Applications,2015, 42(20):7245-7251.

共引文献204

同被引文献48

引证文献6

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部