期刊文献+

基于CNN-LSTM的工控协议同源攻击检测方法 被引量:3

ICS PROTOCOL HOMOLOGOUS ATTACK DETECTION METHOD BASED ON CNN-LSTM
下载PDF
导出
摘要 攻击者溯源对于维护工业控制系统(Industrial Control System,ICS)安全十分重要。通过部署分布式工控蜜罐,收集工控恶意流量,提出基于CNN-LSTM的工控协议同源攻击检测方法,运用CNN和基于注意力机制的LSTM对数据包和流量特征进行学习,根据BP反向传播算法对模型进行迭代寻优分类。模型相比较其他方法,具有更高的准确率和F值,对处理离线工控蜜罐数据具有相当的优势,准确率达到93.7%;找到包括Shodan、Cencys这类知名设备搜索引擎在内的10个组织,涉及到的IP节点超过200个。 Attacker traceback is very important to maintain the security of industrial control system(ICS).By deploying distributed ICS honeypots and collecting ICS malicious traffic,we propose an ICS protocol homologous attack detection method based on CNN-LSTM.The CNN and attention-based LSTM were used to learn packet and traffic characteristics.The model was iteratively optimized according to BP back propagation algorithm.Compared with other methods,the model has higher accuracy and F1 value,and has a considerable advantage in processing off-line ICS honeypot data,with an accuracy of 93.7%.We found 10 groups including Shodan,cencys and other well-known equipment search engines,involving more than 200 IP nodes.
作者 禹宁 竹瑞博 狄婷 任晓刚 王建华 Yu Ning;Zhu Ruibo;Di Ting;Ren Xiaogang;Wang Jianhua(Information and Telecommunication Company,State Grid Shanxi Electric Power Corporation,Taiyuan 030021,Shanxi,China;Shanxi Liantuo Technology Company Limited,Taiyuan 030021,Shanxi,China;College of Information and Computer,Taiyuan University of Technology,Taiyuan 030024,Shanxi,China)
出处 《计算机应用与软件》 北大核心 2023年第5期331-337,共7页 Computer Applications and Software
基金 山西省重点研发项目(201903D121121) 山西省自然科学基金项目(201701D111002)。
关键词 攻击者溯源 工控安全 工控蜜罐 CNN-LSTM 同源攻击检测 Attacker traceback ICS security ICS honeypot CNN-LSTM Homologous attack detection
  • 相关文献

参考文献4

二级参考文献48

  • 1[1]B Krishnamurthy.Mohonk:Mobile honeypots to trace unwanted traffic early.The ACM SIGCOMM Workshop on Network Troubleshooting (NetT'04),Portland,Oregon,USA,2004
  • 2[2]The Honeynet Project.http://www.honeynet.org,2007
  • 3[3]N Provos.A virtual honeypot framework.The 13th USENIX Security Symposium,San Diego,CA,USA,2004
  • 4[4]Hassan Artail,Haidar Safa,Malek Sraj,et al.A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks.Computers & Security,Alexandria,VA,USA,2006
  • 5[5]Z Kuwatly,Masri M Sraj,H Artail.A dynamic honeypot design for intrusion detection.ACS/IEEE Int'l Conf on Pervasive Services (ICPS 2004),Beirut,Lebanon,2004
  • 6[6]Xuxian Jiang,Dongyan Xu,Yi-Min Wang.Collapsar:A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention.Journal of Parallel and Distributed Computing,2006,66(9):1165-1180
  • 7[7]C Kreibich,J Crowcroft.Honeycomb:Creating intrusion detection signatures using honeypots.ACM SIGCOMM Computer Communication Review,2004,34(1):51-56
  • 8[8]Urjita Thakar.HoneyAnalyzer:Analysis and extraction of intrusion detection patterns & signatures using honeypot.The 2nd Int'l Conf on Innovations in Information Technology,Dubai,UAE,2005
  • 9[9]Yegneswaran,et al.An architecture for generating semantics-aware signatures.Usenix Security Symposium,Baltimore,MD,2005
  • 10[10]Riebach,Rathgeb,Tdtmann.Risk assessment of production networks using honeynets-some practical experience.In:LNCS 3339.Berlin:Springer,2005

共引文献145

同被引文献31

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部