期刊文献+

一种应对APT攻击的安全架构:异常发现 被引量:20

Security Architecture to Deal with APT Attacks:Abnormal Discovery
下载PDF
导出
摘要 威胁是一种对特定系统、组织及其资产造成破坏的潜在因素,反映的是攻击实施者依照其任务需求对被攻击对象长期持续地施以各种形式攻击的过程.面对高级可持续威胁(advanced persistent threat,APT),在其造成严重经济损失之前,现有的安全架构无法协助防御者及时发现威胁的存在.在深入剖析威胁的外延和内涵的基础上,详细探讨了威胁防御模型.提出了一种应对APT攻击的安全防御理论架构:异常发现,以立足解决威胁发现的难题.异常发现作为防御策略和防护部署工作的前提,通过实时多维地发现环境中存在的异常、解读未知威胁、分析攻击实施者的目的,为制定具有针对性的应对策略提供必要的信息.设计并提出了基于异常发现的安全体系技术架构:"慧眼",通过高、低位协同监测的技术,从APT攻击的源头、途径和终端3个层面监测和发现. Threat is a potential damage to specific systems, organizations and their assets. It exists in the process of various prolonged attacks to the targets by attackers in light of their task requirement. Facing advanced persistent threat (APT), the existing security architecture cannot help the victims to detect the threat in time before serious economic losses are caused. Based on the in-depth analysis of the denotation and connotation of threat, this paper explores defense models to threat in details and proposes a theoretic security and defense framework to deal with the APT: abnormal discovery, so as to solve the problem of threats detection. As the prerequisite of defensing policy and protective deployment, abnormal discovery can provide the necessary information for making an effective and targeted defensing policy through discovering the abnormal in the environment in real time and in multi dimension, unscrambling unknown thread and analyzing the attackers' purpose. "Wizeye", a security architecture based on abnormal discovery is designed and proposed. With high and low monitoring technology coordination, it can monitor and detect the APT from its source, pathway and terminal.
出处 《计算机研究与发展》 EI CSCD 北大核心 2014年第7期1633-1645,共13页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(2011AA01A103)
关键词 高级可持续威胁 异常发现 高位监测 低位监测 慧眼 advanced persistent threat (APT) abnormal discovery high monitoring low monitoring Wizeye
  • 相关文献

参考文献24

  • 1RSA. RSA security brief: Mobilizing intelligent security operations for advanced persistent threats [OL]. 2011 [2013- 07-11]. http=//www, eme. corn/utilities/search, esp. 被引量:1
  • 2Tankard C. Advanced persistent threats and how to monitor and deter them[J]. Network Security, 2011 (8): 16-19. 被引量:1
  • 3Li F, Lai A, Ddl D. Evidence of advanced persistent threat: A case study of malware for political espionage [C] //Proc of the 6th Int Conf on Malicious and Unwanted Software (MALWARE 2011). Piscataway, NJ: IEEE, 2011:102-109. 被引量:1
  • 4杜跃进.APT应对面临的挑战——关于APT的一些问题[J].信息安全与通信保密,2012(7):13-14. 被引量:6
  • 5翟立东,李跃,贾召鹏,郭莉.融合网络空间的APT威胁检测与防护[J].信息网络安全,2013(3):58-60. 被引量:9
  • 6杜跃进,穆瑛.往哪走 做什么 怎么办 如何应对APT及新阶段网络安全威胁?[J].信息安全与通信保密,2012(7):1-1. 被引量:1
  • 7Kurtz G. Operation aurora hit Google, others [OL]. 2010- 01-14 [2013-07-11]. http://siblog, mcafee, eomleto/operation-% E2. 被引量:1
  • 8McAfee Labs and McAfee Foundstone Professional Services. Protecting your critical assets: Lessons learned from operation Aurora [OL]. 2011-08-03 [2013-07-11]. http:// bit. Iy/xSDUXE. 被引量:1
  • 9McMillan R. Siemens: Stuxnet worm hit industrial systems [OL]. (2010-09-14) [2013-07-11]. http://www, computervcorld. com/s/article/9185419[SiemensStuxnetworm hit industrial systems. 被引量:1
  • 10Falliere N, Murchu L O, Chien E. W32. Stuxnet Dossier [OL]. (2011-03-09)[2013-07-12]. http://www, h4ekr, us/ library/Documents/ICS _ Events/Smxnet% 20Dossier% 20 (Symantec) %20vl. 4. pdf. 被引量:1

二级参考文献7

共引文献37

同被引文献230

引证文献20

二级引证文献170

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部