期刊文献+

基于HMM的APT攻击路径预测 被引量:1

Attack path prediction of APT based on HMM
下载PDF
导出
摘要 针对当前高级持续性威胁(advanced persistent threat,APT)攻击防御技术以被动防御为主的问题,以主动防御为出发点,研究提出基于隐马尔可夫模型(hidden Markov model,HMM)的APT攻击路径预测方法,该方法分为建模和预测两部分。在建模方面,首先针对APT攻击的特点建立了APT攻击的隐马尔可夫通用模型,然后提出能够针对某一具体APT攻击,生成该APT攻击的HMM的算法。在预测方面,针对APT攻击样本数量少的问题,改进了HMM的参数计算方法,并引入报警信息确定预测起点,提出一种路径预测算法。实验通过模拟极光行动的攻击方式及流程搭建实验环境,结果表明,该建模及预测算法符合APT攻击场景,并能达到路径预测的目的。 Aiming at the issue that the current advanced persistent threat(APT)attack defense technology is mainly based on passive defense and taking the active defense as a starting point,a method of APT attack path prediction based on the hidden Markov model(HMM)is proposed.The method is divided into modeling and prediction.In the aspect of modeling,firstly,ageneral HMM model for APT attacks according to characteristics of APT attacks is established.Then,an algorithm to generate the HMM model for specific APT attacks based on the current information input is proposed.In another aspect of prediction,it first improves the parameter calculation method of the HMM model for the less APT samples and then proposes an algorithm of path prediction by adding alert information which can giving the start point of prediction.In the experiment,it establish an experimental environment by simulating the attack method of aurora attack and the results shows that the methods of modeling and prediction meet the APT attack method and situation and they can complete the aim of path prediction.
作者 杜镇宇 刘方正 李翼宏 DU Zhenyu;LIU Fangzheng;LI Yihong(National University of Defense Technology,Hefei 230037,China)
机构地区 国防科技大学
出处 《系统工程与电子技术》 EI CSCD 北大核心 2019年第4期826-834,共9页 Systems Engineering and Electronics
基金 国家自然科学基金(U1636201)资助课题
关键词 高级持续性威胁 隐马尔可夫模型 建模 路径预测 advanced persistent threat(APT) hidden Markov model(HMM) modeling path prediction
  • 相关文献

参考文献9

二级参考文献53

  • 1冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:31
  • 2王晶晶,史开泉,雷英杰.一种基于函数S-粗集的态势预测方法[J].系统工程与电子技术,2007,29(2):214-216. 被引量:5
  • 3王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:57
  • 4雷英杰,王宝树,胡军红.直觉模糊等价矩阵构造方法[J].系统工程理论与实践,2007,27(7):127-131. 被引量:11
  • 5Mehta V, Bartzis C, Zhu H F. Ranking attack graphs//Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID). Hamburg, Germany, 2006, 127-144.
  • 6Sawilla R, Ou X M. Identifying critical attack assets in dependency attack graphs//Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS). Malaga, Spain, 2008:18-34.
  • 7Ou X M, Boyer W F. A scalable approach to attack graph generation//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS). Alexandria, USA, 2006. 336-345.
  • 8Wang L Y, Tania I. An attack graph-based probabilistic security metric//Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec). London, UK, 2008:283-296.
  • 9Homer J, Ou X M, Schmidt D. A sound and practical approach to quantifying security risk in enterprise networks. Kansas State University: Technical Report 2009-3, 2009.
  • 10Singhal A, Ou X M. Security risk analysis of computer networks: Techniques and challenge//Proceedings of the 16th ACM Computer and Communications Security(CCS). Chicago, USA, 2009.

共引文献144

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部