首页 | 本学科首页   官方微博 | 高级检索  
     检索      

面向组织溯源的威胁行为技术关联研究
引用本文:陈柏翰,王俊峰,唐宾徽,于忠坤,葛文翰,余坚.面向组织溯源的威胁行为技术关联研究[J].四川大学学报(自然科学版),2022,59(1):012006-77.
作者姓名:陈柏翰  王俊峰  唐宾徽  于忠坤  葛文翰  余坚
作者单位:四川大学计算机学院,成都610065;四川大网络空间安全学院,成都610065
基金项目:国家重点研发计划项目 (2018YFB0804503、2019QY1400);国家自然科学基金项目 (U20A20161, U1836103);基础加强计划项目(2019-JCJQ-ZD-113) .
摘    要:在网络入侵日趋组织化的今天,如何有效地对威胁组织进行追踪溯源是网络安全防御中的重要内容.威胁行为模式作为入侵受害者系统时的表现形式,于入侵者而言很难改变,是入侵者的一种高级特征.若能有效提取组织的威胁行为模式,那么将大幅提高组织溯源的成功率和准确率.为此,本文从组织行为模式的角度提出威胁行为技术关联算法.该算法扩展了Ward连接凝聚层次聚类,可通过对组织所使用的入侵技术进行聚类学习以提取组织的威胁行为模式,并以95%的置信度验证了威胁行为之间的技术关联性.本文通过该算法生成的威胁行为技术关联模型,包含97类威胁行为技术关联簇,每一类簇可直观地看到不同组织所对应的威胁行为模式,可为组织溯源提供有力支撑.

关 键 词:网络入侵  溯源  威胁行为模式  技术关联  聚类
收稿时间:2021/5/10 0:00:00
修稿时间:2021/6/15 0:00:00

Research on threat behavior Technique Association for organization traceability
CHEN Bo-Han,WANG Jun-Feng,TANG Bin-Hui,YU Zhong-Kun,GE Wen-Han and YU Jian.Research on threat behavior Technique Association for organization traceability[J].Journal of Sichuan University (Natural Science Edition),2022,59(1):012006-77.
Authors:CHEN Bo-Han  WANG Jun-Feng  TANG Bin-Hui  YU Zhong-Kun  GE Wen-Han and YU Jian
Institution:College of Computer Science, Sichuan University,College of Computer Science, Sichuan University,School of Cyber Science and Engineering, Sichuan University,College of Computer Science, Sichuan University,College of Computer Science, Sichuan University,College of Computer Science, Sichuan University
Abstract:Nowadays, network attacks are becoming more and more organized. How to effectively trace the source of threat organizations is an important part of network security defense. As the manifestation of attacking the victim"s system, threat behavior pattern is difficult to change, which is an advanced feature of the attacker. If the threat behavior patterns can be extracted effectively, the success rate and accuracy of organization traceability will be greatly improved. Therefore, this paper proposes threat behavior Technique Association Algorithm from the perspective of organizational behavior pattern. The algorithm extends the Ward connection aggregation hierarchical clustering, which can extract the threat behavior patterns of the organization by clustering the attack techniques used by the organization, and verifies the technical correlation between the threat behaviors with 95% confidence. In this paper, the threat behavior Technique Association model generated by the algorithm includes 97 types of threat behavior Technique Association clusters. Each cluster can directly see the corresponding threat behavior patterns of different organizations, which can provide strong support for organization traceability.
Keywords:Network attack  Traceability  Threat behavior pattern  Technology association  Clustering
本文献已被 万方数据 等数据库收录!
点击此处可从《四川大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《四川大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号