通信学报 ›› 2019, Vol. 40 ›› Issue (7): 57-66.doi: 10.11959/j.issn.1000-436x.2019142

• 学术论文 • 上一篇    下一篇

基于网络通信异常识别的多步攻击检测方法

琚安康,郭渊博,李涛,叶子维   

  1. 战略支援部队信息工程大学密码工程学院,河南 郑州 450001
  • 修回日期:2019-05-22 出版日期:2019-07-25 发布日期:2019-07-30
  • 作者简介:琚安康(1995- ),男,河南辉县人,战略支援部队信息工程大学博士生,主要研究方向为多步攻击检测、异构安全数据融合。|郭渊博(1975- ),男,陕西周至人,博士,战略支援部队信息工程大学教授、博士生导师,主要研究方向为大数据安全、态势感知。|李涛(1992- ),男,甘肃甘谷人,战略支援部队信息工程大学博士生,主要研究方向为网络威胁语义建模。|叶子维(1990- ),男,吉林通化人,战略支援部队信息工程大学博士生,主要研究方向为网络安全、态势感知。
  • 基金资助:
    国家自然科学基金资助项目(61501515)

Multi-step attack detection method based on network communication anomaly recognition

Ankang JU,Yuanbo GUO,Tao LI,Ziwei YE   

  1. Department of Cryptogram Engineering,Strategic Support Force Information Engineering University,Zhengzhou 450001,China
  • Revised:2019-05-22 Online:2019-07-25 Published:2019-07-30
  • Supported by:
    The National Natural Science Foundation of China(61501515)

摘要:

针对企业内部业务逻辑固定、进出网络访问行为受控等特点,首先定义了2类共4种异常行为,然后提出了基于网络通信异常识别的多步攻击检测方法。针对异常子图和异常通信边2类异常,分别采用基于图的异常分析和小波分析方法识别网络通信过程中的异常行为,并通过异常关联分析检测多步攻击。分别在DARPA 2000数据集和LANL数据集上进行实验验证,实验结果表明,所提方法可以有效检测并重构出多步攻击场景。所提方法可有效监测包括未知特征攻击类型在内的多步攻击,为检测 APT 等复杂的多步攻击提供了一种可行思路,并且由于网络通信图大大减小了数据规模,因此适用于大规模企业网络环境。

关键词: 多步攻击, 网络异常, 通信子图, 小波变换

Abstract:

In view of the characteristics of internal fixed business logic,inbound and outbound network access behavior,two classes and four kinds of abnormal behaviors were defined firstly,and then a multi-step attack detection method was proposed based on network communication anomaly recognition.For abnormal sub-graphs and abnormal communication edges detection,graph-based anomaly analysis and wavelet analysis method were respectively proposed to identify abnormal behaviors in network communication,and detect multi-step attacks through anomaly correlation analysis.Experiments are carried out on the DARPA 2000 data set and LANL data set to verify the results.The experimental results show that the proposed method can effectively detect and reconstruct multi-step attack scenarios.The proposed method can effectively monitor multi-step attacks including unknown feature types.It provides a feasible idea for detecting complex multi-step attack patterns such as APT.And the network communication graph greatly reduces the data size,it is suitable for large-scale enterprise network environments.

Key words: multi-step attack, network anomaly, communication graph, wavelet analysis

中图分类号: 

No Suggested Reading articles found!