期刊文献+

基于网络动态全流量分析的未知威胁发现 被引量:1

New Generation Unknown Threat Discovery Based on Network Dynamic Traffic
下载PDF
导出
摘要 目前,全球网络安全已步入未知威胁时代,大型网络动态流量安全分析仪器是国家网络安全的基石,具有不可替代的重要性。如何快速分析、发现网络流量中对我国家安全有害的恶意网络行为,特别是未知攻击,是当下我国家网络安全亟待解决的重大战略需求。传统网络流量安全分析需要攻方武器完整的先验知识,然而对于未知威胁,防守方几乎不可能做到此事。于是,传统方法就此陷入一个难以逾越的技术瓶颈,需要另辟蹊径。本文通过内生安全理念,模拟免疫系统未知病毒识别机理,形成先验知识不完备条件下未知威胁的快速发现、快速追踪、以及快速表征等三大创新能力,藉此突破传统方法在未知威胁分析方面的技术瓶颈,分析具备未知威胁发现能力的网络动态流量安全分析平台的发展趋势,将从理论和实战两方面促进我国网络安全科技进步,意义重大而深远。 Currently,global network security has entered the era of unknown threats.How to quickly analyze and find malicious behaviors,especially unknown attacks,which are armful to the national security in network traffic has become a major strategic need demanding to be solved for the national network security.Traditional network traffic security analysis equires the complete prior knowledge of the attacks.However,for unknown threats,it is basically difficult or even impossible to obtain such prior information.As a result,traditional methods have fallen into an insurmountable technical bottleneck,which provokes the need to find a new solution.Our project simulates the recognition mechanism of unknown viruses in the human immune system.By deducing and predicting unknown attacks from the evolution of the gene fragments of typical network threats,we are able to achieve three major innovations including rapid detection,traceability,and characterization of unknown network threats under the condition of incomplete prior knowledge,which breaks through the technical bottleneck of traditional methods in unknown threat analysis.On this basis,we aim to develop a large-scale equipment for adaptive network dynamic traffic security analyzer,and deploy it in practical applications.Large-scale network dynamic traffic security analyzer,as the cornerstone of national network security,is of irreplaceable importance.The evelopment of the network dynamic traffic security analyzer with the ability to detect unknown threats will promote the scientific and technological progress of national network security,which is of great and far-reaching significance.
作者 余荣威 王永 赵波 赵健 Yu Rongwei;Wang Yong;Zhao Bo;Zhao Jian(School of Cyber Science and Engineering,Wuhan University,Wuhan Hubei,430072;Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,Wuhan Hubei,430072)
出处 《工业信息安全》 2022年第6期38-45,共8页 Industry Information Security
关键词 网络内生安全 未知威胁发现 动态流量分析 模拟免疫系统 Cyberspace Endogenous Security Unknown Threat Discovery Dynamic Traffic Analysis Simulated Immune System
  • 相关文献

参考文献2

二级参考文献42

  • 1朱有产,熊伟,静永文,高亚彬.基于Rough Set理论的综合分类器设计与实现[J].通信学报,2006,27(z1):63-67. 被引量:6
  • 2卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:231
  • 3梁可心,李涛,刘勇,陈桓.一种基于人工免疫理论的新型入侵检测模型[J].计算机工程与应用,2005,41(2):129-132. 被引量:13
  • 4邬书跃,田新广.基于隐马尔可夫模型的用户行为异常检测新方法[J].通信学报,2007,28(4):38-43. 被引量:20
  • 5苗夺谦,李道国.粗糙集理论、算法及应用[M].北京:清华大学出版社,2008:176-235.
  • 6ANDERSON J P. Computer Security Threat Monitoring and Surveil- lance[R]. Pennsylvania, 1980.
  • 7DENNING DOROTHY E. An intrusion detection model[J]. IEEE Transaction on SoRwarc Engineer on SoRware Engineering, 1987, 13 (2):222-232.
  • 8FORREST S,PERELSON A, ALLEN L, et al. Self-nonself diserimi- nation in a computer[A]. Proeeedings of the 1994 IEEE Symposium on Research in Security and Privacy[C]. Los Alamitos, CA, 1994. 202-212.
  • 9HOFMEYR S, FORREST S. Architecture for an artificial immune system[J]. Evolutionary Computation, 2000, 8(4):443-473.
  • 10YANG H,GUO J H, DENG FQ. Collaborative RFID intrusion detec- tion with an artificial immune system[J]. Journal of Intelligent Infor- mation Systems, 2011,36( 1 ): 1-26.

共引文献49

同被引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部