期刊文献+

基于大数据分析的APT攻击检测研究综述 被引量:81

Detecting APT attacks: a survey from the perspective of big data analysis
下载PDF
导出
摘要 高级持续性威胁(APT,advanced persistent threat)已成为高安全等级网络的最主要威胁之一,其极强的针对性、伪装性和阶段性使传统检测技术无法有效识别,因此新型攻击检测技术成为APT攻击防御领域的研究热点。首先,结合典型APT攻击技术和原理,分析攻击的6个实施阶段,并归纳攻击特点;然后,综述现有APT攻击防御框架研究的现状,并分析网络流量异常检测、恶意代码异常检测、社交网络安全事件挖掘和安全事件关联分析等4项基于网络安全大数据分析的APT攻击检测技术的研究内容与最新进展;最后,提出抗APT攻击的系统综合防御框架和智能反馈式系统安全检测框架,并指出相应技术在应对APT攻击过程中面临的挑战和下一步发展方向。 Advanced persistent threats have become the major threats of highly protected networks. Traditional detecting technologies were not able to find out APT attacks which were targeted, pretended and persistent. As a result, novel detecting technologies dave become the hot topic in the field of APT defence. Firstly, concrete descriptions of the six phases of APT attacks were provided combined with typical technologies and theories of APT, the features of APT attacks were conduded. Secondly, the current research situation of frameworks defending APT was illustrated, and the research points and recent developments of four key technologies including anomalous detection of network flow, anomalous detection of malevolent codes, security events mining in social networks and correlation analysis of security events were analyzed. Finally, both the comprehensive defending framework and the detecting framework based on intelligent feedback were established, and the challenges and developing directions of detecting technologies in the process of dealing with APT attacks were pointed out.
出处 《通信学报》 EI CSCD 北大核心 2015年第11期1-14,共14页 Journal on Communications
基金 国家自然科学基金资助项目(61100042) 中国博士后基金资助项目(2014M552656) 湖北省自然科学基金资助项目(2015CFC867)~~
关键词 网络安全检测 高级持续性威胁 大数据分析 智能反馈 关联分析 Key words: network security detection advanced persistent threat big data analysis intelligent feedback correlationanalysis
  • 相关文献

参考文献124

  • 1CHEN P,DESMET L, HUYGENS C, A study on advanced persistentthreats[A]. Communications and Multimedia Security-15th Interna-tional Conference[C]. 2014. 63-72. 被引量:1
  • 2NIKOS V’ DIMITRI G. The big four?what we did wrong in advancedpersistent threat detection [A]. International Conference on Availability,Reliability and Security[C]. 2013. 248-254. 被引量:1
  • 3YANG G M Z, TIAN Z H, DUAN W L. The prevent of advancedpersistent threat[J], Journal of Chemical and Pharmaceutical Research,2015, 6(1):572-576. 被引量:1
  • 4FRIEDBERGI,SKOPIK F, SETTANNIG, et al. Combating advancedpersistent threats: from network event correlation to incident detec-tion[J]. Computers & Security, 2015, 48(2):35-57. 被引量:1
  • 5BUTT MIA. BIOS integrity: an advanced persistent threat[A]. Con-ference Proceedings - 2014 Conference on Information Assurance andCyber Security[C]. 2014. 47-50. 被引量:1
  • 6CHRISTOS X, CHRISTOFOROS N. Advanced persistent tiireat in 3Gnetworks: attacking the home network from roaming networks [J].Computers & Security, 2015, 40(2): 84-94. 被引量:1
  • 7ZHAO W T, ZHANG P F,ZHANG F. Extended Petri net-basedadvanced persistent threat analysis model[J], Lecture Notes in Electri-cal Engineering LNEE, 2014,277: 1297-1305. 被引量:1
  • 8GIURA P, WANG W. Using large scale distributed computing to un-veil advanced persistent threats[J]. Science, 2013, 1(3):93-105. 被引量:1
  • 9王元卓,靳小龙,程学旗.网络大数据:现状与展望[J].计算机学报,2013,36(6):1125-1138. 被引量:712
  • 10NIST. Managing Information Security Risk: Organization, Mission,and Information System ViewfR]. US Department of Commerce, 2011. 被引量:1

二级参考文献1072

共引文献3354

同被引文献530

引证文献81

二级引证文献583

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部