期刊文献+

面向网络攻击建模的分布式过程挖掘与图分割方法 被引量:8

Distributed Process Mining and Graph Segmentation for Network Attack Modeling
下载PDF
导出
摘要 网络攻击建模利用网络安全设备产生的日志对网络攻击行为进行建模,发现网络攻击的特点与规律,以提高应对突发网络攻击的能力.针对网络攻击建模,本文提出了一种攻击图生成方法,基于网络攻击行为与工作流的相似性,利用启发式过程挖掘算法对网络攻击行为建模,生成网络攻击图;针对网络攻击图过于复杂的问题,提出了一种攻击图分割方法,通过分离攻击分支步骤分割网络攻击图,在保留网络攻击图的基本结构的同时,将复杂网络攻击图划分为多个网络攻击子图,提高了网络攻击图的可读性;针对海量安全日志数据的网络攻击建模问题,提出了分布式攻击图生成算法以及攻击图分割方法,提高了网络攻击模型的挖掘效率.实验表明,相较于对比方法,本文提出的方法能够更完备地挖掘入侵者的攻击步骤. Attack modeling aims to generate attack models by investigating attack behaviors recorded in intrusion alerts raised in network security devices.Attack models can help network security administrators discover an attack strategy that intruders use to compromise the network and implement a timely response to security threats.However,the state-of-the-art algorithms for attack modeling are unable to obtain a high-level or global-oriented viewof the attack strategy.To address the aforementioned issue,considering the similarity between attack behavior and workflow,we employ a heuristic process-mining algorithm to generate the initial attack graph.Although the initial attack graphs generated by the heuristic process mining algorithm are complete,they are extremely complex for manual analysis.To improve their readability,we propose a graph segmentation algorithm to split a complex attack graph into multiple subgraphs while preserving the original structure.Furthermore,to handle massive volume alert data,we propose a distributed attack graph generation algorithm based on Hadoop MapReduce and a distributed attack graph segmentation algorithm based on Spark GraphX.Additionally,we conduct comprehensive experiments to validate the performance of the proposed algorithms.The experimental results demonstrate that the proposed algorithms achieve considerable improvement over comparative algorithms in terms of accuracy and efficiency.
作者 刘贞宇 陈羽中 郭昆 张毓东 LIU Zhen-yu;CHEN Yu-zhong;GUO Kun;ZHANG Yu-dong(Fujian Key Laboratory of Network Computing and Intelligent Information Processing,Fuzhou University,Fuzhou 350116,China;Key Laboratory of Spatial Data Mining&Information Sharing,Fuzhou University,Fuzhou 350116,China)
出处 《小型微型计算机系统》 CSCD 北大核心 2020年第8期1732-1740,共9页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61672158,61972097)资助 福建省高校产学合作项目(2018H6010)资助 福建省自然科学基金项目(2018J01795)资助。
关键词 分布式攻击建模 过程挖掘 攻击图 图分割 distributed attack modeling process mining attack graph graph segmentation
  • 相关文献

参考文献2

二级参考文献23

  • 1冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:31
  • 2Swiler LP,Phillips C,Gaylor T.A graph-based network-vulnerability analysis system.Technical Report,SANDIA Report No.SAND 97-3010/1,1998.
  • 3Swiler LP,Phillips C,Ellis D,Chakerian S.Computer-Attack graph generation tool.In:Proc.of the 2nd DARPA Information Survivability Conf.& Exposition.Los Alamitos:IEEE Computer Society Press,2001.307-321.
  • 4Lippmann RP,Ingols KW.An annotated review of past papers on attack graphs.Technical Report,ESC-TR-2005-054,MIT Lincoln Laboratory,2005.
  • 5Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities.In:Proc.of the 2000 IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2000.156-165.
  • 6Sheyner O,Jha S,Wing JM,Lippmann RP,Haines J.Automated generation and analysis of attack graphs.In:Hinton H,Blakley B,Abadi M,Bellovin S,eds.Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2002.273-284.
  • 7Jha S,Sheyner O,Wing J.Two formal analyses of attack graphs.In:Proc.of the 15th IEEE Computer Security Foundations Workshop.Cape Breton:IEEE Computer Society,2002.49-63.
  • 8Ou XM,Boyer WF,McQueen MA.A scalable approach to attack graph generation.In:Proc.of the 13th ACM Conf.on Computer and Communications Security.Alexandria:ACM Press,2006.336-345.
  • 9Ou XM.A logic-programming approach to network security analysis[Ph.D.Thesis].Princeton:Princeton University,2005.
  • 10Ammann P,Wijesekera D,Kaushik S.Scalable,graph-based network vulnerability analysis.In:Proc.of the 9th ACM Conf.on Computer and Communications Security.New York:ACM Press,2002.217-224.

共引文献83

同被引文献53

引证文献8

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部