首页 | 本学科首页   官方微博 | 高级检索  
     

基于FP-Growth算法及补偿性入侵证据的攻击意图识别
引用本文:白昊,王崑声,胡昌振,张刚,经小川. 基于FP-Growth算法及补偿性入侵证据的攻击意图识别[J]. 北京理工大学学报, 2010, 30(8): 930-934
作者姓名:白昊  王崑声  胡昌振  张刚  经小川
作者单位:北京理工大学,计算机学院,北京,100081;中国航天工程咨询中心,北京,100048
基金项目:国家"八六三"计划项目
摘    要:针对现有方法的入侵证据单一,系统资源消耗大及最终结果不准确等问题,提出了一种新的攻击意图识别方法.将IDS的告警事件与其他安全工具如扫描器等的数据相融合,构成补偿性入侵证据,并在此基础上使用贝叶斯网络构建攻击场景;使用FP-Growth算法从攻击场景中挖掘出频繁攻击模式;最终将产生的频繁攻击模式关联以重构攻击路径,从而推断最可能的攻击意图.实验结果表明,该方法可准确识别攻击意图并有效节省系统资源.

关 键 词:攻击路径  攻击意图  补偿性入侵证据  频繁攻击模式  FP-Growth算法
收稿时间:2009-08-20

Recognition of Attack Strategy Based on FP-Growth Algorithm and Compensatory Intrusion Evidence
BAI Hao,WANG Kun-sheng,HU Chang-zhen,ZHANG Gang and JING Xiao-chuan. Recognition of Attack Strategy Based on FP-Growth Algorithm and Compensatory Intrusion Evidence[J]. Journal of Beijing Institute of Technology(Natural Science Edition), 2010, 30(8): 930-934
Authors:BAI Hao  WANG Kun-sheng  HU Chang-zhen  ZHANG Gang  JING Xiao-chuan
Affiliation:School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China;China Aerospace Engineering Consultation Center, Beijing 100048, China;School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China;China Aerospace Engineering Consultation Center, Beijing 100048, China;China Aerospace Engineering Consultation Center, Beijing 100048, China
Abstract:Limitations existed with current methods for attack intention recognition. For instance, they lacked compensatory intrusion evidences, cost enormous system resources and had low precision. To avoid the above flaws, a novel and effective method is proposed. The method generated compensatory intrusion evidences by fusing data from IDS and other security kits like scanner. Then, Bayesian-based attack scenarios were constructed where frequent attack patterns were identified using an efficient data-mining algorithm based on frequent patterns. Finally, attack paths were rebuilt by re-correlating frequent attack patterns mined in the scenarios to judge possible attack strategies precisely. The experimental results demonstrate the capability of the proposed method in rebuilding attack paths, recognizing attack intentions as well as in saving system resources.
Keywords:attack path  attack strategy  compensatory intrusion evidence  frequent attack pattern  FP-Growth
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《北京理工大学学报》浏览原始摘要信息
点击此处可从《北京理工大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号