期刊文献+

一种面向网络行为因果关联的攻击检测方法

Approach for Detecting Attack Based on Causality of Network Behavior
下载PDF
导出
摘要 为了能在攻击目标受损之前检测到攻击事件,提出了一种面向网络行为因果关联的攻击检测方法.基于SNMPMIB数据,根据攻击目标的异常行为,利用GCT从检测变量中挖掘出与异常变量存在整体行为关联的基本攻击变量,然后针对异常行为特征,再次利用GCT从基本攻击变量中挖掘出与异常变量存在局部行为关联的攻击变量,最后根据攻击变量和异常变量之间的因果关系,构建面向攻击方检测的攻击关联规则.在Trin00 UDP Flood检测实验中,所提方法在挖掘出攻击变量udp Out Datagrams上取得了满意的检测效果. An SNMP MIB oriented approach based on causality in network behavior is presented in order to detect attack before the security of target is damaged.According to the behavior of an abnormal variable in target,Granger causality test(GCT) is used to find preliminary attacking variables which are causality relevant to the abnormal variable in whole network behavior.Depending on the behavior features hidden in the abnormal behavior,GCT is used again to recognize attacking variables which are causality relevant to the abnormal variable in local network behavior.The causality between attacking variables and the abnormal variable is then used to construct detecting rules,which are oriented to attacker.udpOutDatagrams acting as attacking variable are recognized successfully and detection results are acquired well in the test of Trin00 UDP Flood.The experiment results show that the approach can effectively detect attacks from attackers,which has effect on blocking the pervasion of attacking procedure to target.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2008年第6期707-707,共1页 Journal of Xi'an Jiaotong University
基金 国家自然科学基金资助项目(60633020,60473136,60373105) 国家高技术研究发展计划资助项目(2006BAH02A24-2,2006BAK11B02,2007AA01Z475) 国家“二四二”信息安全计划资助项目(2006C26)
关键词 网络行为 攻击目标 GCT检测 检测方法 network behavior attack detection causality test management information base
  • 相关文献

参考文献2

二级参考文献20

  • 1ADAS A. Traffic models in broadband networks[J]. IEEE Communications Magazine, 1997, 35(7): 82-89. 被引量:1
  • 2MAGLARIS B, et al. Performance models of statistical multiplexing in packet video communications[J]. IEEE Trans Commun,1998,36(7): 834-844. 被引量:1
  • 3GRUNENFELDER R, et al. Characterization of video codecs as autoregressive moving average processes and ralated queuing system performance[J]. IEEE JSAC, 1991,9(4): 283-293. 被引量:1
  • 4FROST V, MEL AMED B. Traffic modeling for telecommunications networks[J]. IEEE Communication Magazine, 1994, 32(3):70-81. 被引量:1
  • 5BASU S, MUKHERJEE A, KLIVANSKY S. Time series models for Internet traffic[A]. Proceedings of INFORCOM[C].1996.611-620. 被引量:1
  • 6SANG A, LIS. A predictability analysis of network traffic[A]. Proceedings of IEEEINFOCOM 2000[C]. 2000. 342-351. 被引量:1
  • 7NORROS I. On the use of fractional brownian motion in the theory of connectionless traffic[J]. IEEE Journal of Selected Areas in Communications, 1995, 13(6): 953-962. 被引量:1
  • 8WILFRID J, FRANK J. Introduction to statistical analysis, third edition[M]. New York: McGraw-Hill Book Company, 1983. 被引量:1
  • 9GEORGEE GWILYMM GREGORYC 顾岚 范金诚译.时间序列分析--预测与控制[M].北京:中国统计出版社,1997.. 被引量:1
  • 10SHIM C, RYOO I, LEE J, et al. Modeling and call admission control algorithm of variable bit rate video in ATM networks[J]. IEEE Journal on Selected Areas in Communications, 1994, 12(2): 332-344. 被引量:1

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部