期刊文献+

基于shell命令的内部攻击检测 被引量:1

Internal Attack Detection Based on Shell Command
下载PDF
导出
摘要 信息系统不仅面临着外部攻击的威胁,同时也面临着来自系统内部的威胁。本文针对系统内部攻击,首先对信息系统的内部威胁和内部攻击进行简要阐述和分析。基于用户操作行为的一般规律,提出几种检测模型,通过对比检测结果找出检测效果好的检测模型。基于SEA公开数据集,采用词袋、TF-IDF、词汇表以及N-Gram几种方法进行特征提取,使用不同的机器学习算法建立检测模型,包括XGBoost算法、隐式马尔可夫和多层感知机(MLP)。结果显示:测试样本采用词袋+N-Gram特征模型和XGBoost学习算法的精确率和召回率较高,检测效果最好。 Information system not only faces the threat of external attack,but also faces the threat from the internal system.In this paper,aiming at the internal attacks of the system,the internal threats and internal attacks of the information system are briefly described and analyzed.Based on the general rules of user’s operation behavior,this paper proposes several detection models,and finds out a good detection model by comparing the detection results.Based on SEA open data set,feature extraction uses several methods,such as word bag,TF-IDF,vocabulary and N-Gram,and uses different machine learning algorithms to build detection model,including XGBoost algorithm,implicit Markov and multi-layer perceptron(MLP).The results show that the accuracy and recall rate of the test samples using the word bag+N-Gram feature model and XGBoost learning algorithm are high,and the detection effect is the best.
作者 陈明帅 吴克河 CHEN Ming-shuai;WU Ke-he(School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China)
出处 《计算机与现代化》 2021年第1期56-60,共5页 Computer and Modernization
基金 国家电网总部科技项目(SGGR0000XTJS1900905)。
关键词 内部攻击检测 极端梯度提升决策树 多层感知机 隐式马尔可夫 internal attack detection XGBoost(extreme gradient boosting) MLP(multi-layer perceptron) implicit Markov
  • 相关文献

参考文献7

二级参考文献47

  • 1Smaha S E. Haystack: An intrusion detection system[ A]. Proceedings of the IEEE forth Aerospace Computer Security Appli- cations Conference[ C ]. Austin, Texas: Tracor Applied Science Inc, 1988.37 - 44.
  • 2Wu H C, Huang S H S. User behavior analysis in masquerade detection using principal component analysis [A ]. Proceedings of the 2008 Eighth International Conference on Intelligent Systems Design and Applications[ C]. Washington DC, USA: IEEE Computer Society, 2008. 201 - 206.
  • 3Shim C Y, Kim J Y, Gantenbein R E. Practical user identification for masquerade detection[ A ]. Advances in Electrical and Electronics Engineering-IAENG Special Edition of the World Congress on Engineering and Computer Science 2008[ C 1. San Francisco, California, USA: IEEE Press, 2008.47 - 51.
  • 4Tian X G,Gao L Z,Sun C L, et al.A method for anomaly detection of user behaviors based on machine learning [ J ]. The Journal of China Universities of Post and Telecommunications, 2006,13(2) :61 - 65,78.
  • 5Dash S K, Reddy K S, Pujari A K. Adaptive Naive Bayes method for masquerade detection[J].Security and Communication Networks,2010, DOI: 10. 1002/sec. 168.
  • 6CouU S E,Branch J W,Szymanski B K, et al. Sequence alignment for masquerade detection [J].Computational Statistics & Data Analysis,2008,52(8) :4116 - 4131.
  • 7Maxion R A, Townsend T N. Masquerade detection using truncated command lines[A]. Proceedings of the International Conference on Dependable Systems and Networks [ C ]. Los Alamitos, California: IEEE Computer Society, 2002. 219 - 228.
  • 8Lane T.Machine Learning Techniques for The Computer Security Domain of Anomaly Detection [ D ]. West Lafayette: Purdue University,2000.
  • 9Lane T, Brodley C E. An empirical study of two approaches to sequence learning for anomaly detection[ J ]. Machine Learning,2003,51(1) :73 - 107.
  • 10Schonlau M, DuMouchel W, Ju W H, et al. Computer intrusion:detecting masquerades [ J ]. Statistical Science, 2001, 16 (1) :58 - 74.

共引文献33

同被引文献18

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部