期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于EBLOF算法的攻击者IP分析系统及应用 被引量:1
1
作者 范敏 李昌茂 +1 位作者 陈飞宇 陈超一 《工程科学与技术》 EI CSCD 北大核心 2022年第3期91-97,共7页
为了在多源、异构、海量的网络威胁入侵告警日志中快速准确定位到高优先级、亟需处理的攻击者IP并构建其特征,缓解安全分析人员的告警疲劳,提高安全运营效率,提出一种基于集成学习的局部异常因子(ensemble based local outlier factor,E... 为了在多源、异构、海量的网络威胁入侵告警日志中快速准确定位到高优先级、亟需处理的攻击者IP并构建其特征,缓解安全分析人员的告警疲劳,提高安全运营效率,提出一种基于集成学习的局部异常因子(ensemble based local outlier factor,EBLOF)算法的攻击者IP分析系统。一方面,该系统通过提取和归并范式化的网络安全告警日志,从攻击者IP的属性维度和攻击行为维度构建特征工程,并借鉴集成学习的思路和传统异常检测算法LOF,构建了鲁棒的EBLOF算法模型,进而发现高威胁的攻击者IP。另一方面,该系统针对机器学习模型难以在线更新的问题,通过批量实时学习技术构建了一套在线学习的架构,从系统架构层面而非算法层面确保模型能够在线更新。将本文提出的算法模型在公共异常检测数据集ODD上开展模型的训练,并对模型的检测效果进行实验验证。实验结果表明,本文模型在不同数据分布下相比原始LOF模型具有更好的鲁棒性。将本文所提的系统应用在真实攻防场景中,通过与安全分析人员进行检出对比分析,验证了所提系统的有效性和可行性。 展开更多
关键词 网络空间态势感知 攻击者分析 局部异常因子 集成学习
下载PDF
Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks
2
作者 Meng-zhou GAO Dong-qin FENG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第9期1098-1111,共14页
Security issues in networked control systems(NCSs) have received increasing attention in recent years.However, security protection often requires extra energy consumption, computational overhead, and time delays,whi... Security issues in networked control systems(NCSs) have received increasing attention in recent years.However, security protection often requires extra energy consumption, computational overhead, and time delays,which could adversely affect the real-time and energy-limited system. In this paper, random cryptographic protection is implemented. It is less expensive with respect to computational overhead, time, and energy consumption,compared with persistent cryptographic protection. Under the consideration of weak attackers who have little system knowledge, ungenerous attacking capability and the desire for stealthiness and random zero-measurement attacks are introduced as the malicious modification of measurements into zero signals. NCS is modeled as a stochastic system with two correlated Bernoulli distributed stochastic variables for implementation of random cryptographic protection and occurrence of random zero-measurement attacks; the stochastic stability can be analyzed using a linear matrix inequality(LMI) approach. The proposed stochastic stability analysis can help determine the proper probability of running random cryptographic protection against random zero-measurement attacks with a certain probability. Finally, a simulation example is presented based on a vertical take-off and landing(VTOL) system. The results show the effectiveness, robustness, and application of the proposed method, and are helpful in choosing the proper protection mechanism taking into account the time delay and in determining the system sampling period to increase the resistance against such attacks. 展开更多
关键词 Networked control systems Security Cyber attacks Stochastic stability Cryptographic protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部