Journal on Communications ›› 2021, Vol. 42 ›› Issue (6): 182-194.doi: 10.11959/j.issn.1000-436x.2021106
• Papers • Previous Articles Next Articles
Hongbin ZHANG1,2, Yan YIN1, Dongmei ZHAO2, Bin LIU3,4
Revised:
2021-04-09
Online:
2021-06-25
Published:
2021-06-01
Supported by:
CLC Number:
Hongbin ZHANG, Yan YIN, Dongmei ZHAO, Bin LIU. Network security situational awareness model based on threat intelligence[J]. Journal on Communications, 2021, 42(6): 182-194.
"
时间 | 标签 |
Monday | Benign |
Tuesday | FTP-Patator(9:20-10:20), SSH-Patator(14:00-15:00) |
Wednesday | DoS Slowloris(9:47-10:10), DoS slowhttptest (10:14-10:35), DoSHulk(10:43-11:00), DoSGoldenEye (11:10-12:23), Heartbleed Attack(15:12-15:23) |
Thursday | Web BForce(9:20-10:00), XSS(10:15-10:35), Sql Injection(10:40-10:42), Web and Infiltration Attacks (14:19-15:45) |
Friday | Botnet(10:02-11:02), PortScans(13:55-15:23), DDoS (15:57-16:16) |
[1] | ZHANG Q Y , LI H , HU J S . A study on security framework against advanced persistent threat[C]// 2017 7th IEEE International Conference on Electronics Information and Emergency Communication. Piscataway:IEEE Press, 2017: 128-131. |
[2] | ??NAR C , ALKAN M , D?RTERLER M ,et al. A study on advanced persistent threat[C]// 2018 3rd International Conference on Computer Science and Engineering. Piscataway:IEEE Press, 2018: 116-121. |
[3] | LI Y Q , DAI W K , BAI J ,et al. An intelligence-driven security-aware defense mechanism for advanced persistent threats[J]. IEEE Transactions on Information Forensics and Security, 2019,14(3): 646-661. |
[4] | ENDSLEY M R . Toward a theory of situation awareness in dynamic systems[J]. Human Factors:the Journal of the Human Factors and Ergonomics Society, 1995,37(1): 32-64. |
[5] | BASS T . Intrusion detection systems and multisensor data fusion[J]. Communications of the ACM, 2000,43(4): 99-105. |
[6] | HE F N , ZHANG Y Q , LIU H Z ,et al. SCPN-based game model for security situational awareness in the Intenet of things[C]// 2018 IEEE Conference on Communications and Network Security. Piscataway:IEEE Press, 2018: 1-5. |
[7] | 翁芳雨 . 基于随机博弈模型的网络安全态势评估与预测方法的研究与设计[D]. 北京:北京邮电大学, 2018. |
WENG F Y . Research and design of network security situation assessment and prediction method based on random game model[D]. Beijing:Beijing University of Posts and Telecommunications, 2018. | |
[8] | 李腾飞, 李强, 余祥 ,等. 基于拓扑漏洞分析的网络安全态势感知模型[J]. 计算机应用, 2018,38(S2): 157-163,169. |
LI T F , LI Q , YU X ,et al. Network security situational awareness model based on topological vulnerability analysis[J]. Journal of Computer Applications, 2018,38(S2): 157-163,169. | |
[9] | IOANNOU G , LOUVIERIS P , CLEWLEY N . A Markov multi-phase transferable belief model for cyber situational awareness[J]. IEEE Access, 2019,7: 39305-39320. |
[10] | 李骏韬 . 基于DNS流量和威胁情报的APT检测研究[D]. 上海:上海交通大学, 2016. |
LI J T . APT detection research based on DNS traffic and threat intelligence[D]. Shanghai:Shanghai JiaoTong University, 2016. | |
[11] | 李炜键, 金倩倩, 郭靓 . 基于威胁情报共享的安全态势感知和入侵意图识别技术研究[J]. 计算机与现代化, 2017(3): 65-70. |
LI W J , JIN Q Q , GUO L . Research on security situation awareness and intrusion intention recognition based on threat intelligence sharing[J]. Computer and Modernization, 2017(3): 65-70. | |
[12] | 杨泽明, 李强, 刘俊荣 ,等. 面向攻击溯源的威胁情报共享利用研究[J]. 信息安全研究, 2015,1(1): 31-36. |
YANG Z M , LI Q , LIU J R ,et al. Research of threat intelligence sharing and using for cyber attack attribution[J]. Journal of Information Security Research, 2015,1(1): 31-36. | |
[13] | MAVROEIDIS V , BROMANDER S . Cyber threat intelligence model:an evaluation of taxonomies,sharing standards,and ontologies within cyber threat intelligence[C]// 2017 European Intelligence and Security Informatics Conference. Piscataway:IEEE Press, 2017: 91-98. |
[14] | SADIQUE F , CHEUNG S , VAKILINIA I ,et al. Automated structured threat information expression (STIX) document generation with privacy preservation[C]// 2018 9th IEEE Annual Ubiquitous Computing,Electronics & Mobile Communication Conference. Piscataway:IEEE Press, 2018: 847-853. |
[15] | ZHANG H , YI Y , WANG J ,et al. Network security situation awareness framework based on threat intelligence[J]. Computers,Materials and Continua, 2018,56(3): 381-399. |
[16] | YANG S , WEI X . Research on optimization model of network attack-defense game[C]// 2017 8th IEEE International Conference on Software Engineering and Service Science. Piscataway:IEEE Press, 2017: 426-429. |
[17] | LIPPMANN R P , FRIED D J , GRAF I ,et al. Evaluating intrusion detection systems:the 1998 DARPA off-line intrusion detection evaluation[J]. Proceedings DARPA Information Survivability Conference and Exposition DISCEX’00, 2000,2(2): 12-26. |
[18] | 席荣荣, 云晓春, 张永铮 ,等. 一种改进的网络安全态势量化评估方法[J]. 计算机学报, 2015,38(4): 749-758. |
XI R R , YUN X C , ZHANG Y Z ,et al. An improved quantitative evaluation method for network security[J]. Chinese Journal of Computers, 2015,38(4): 749-758. | |
[19] | SHARAFALDIN I , HABIBI LASHKARI A , GHORBANI A A . Toward generating a new intrusion detection dataset and intrusion traffic characterization[C]// Proceedings of the 4th International Conference on Information Systems Security and Privacy. Piscataway:IEEE Press, 2018: 108-116. |
[20] | 李希灿 . 模糊数学方法及应用[M]. 北京: 化学工业出版社, 2016. |
LI X C . Fuzzy mathematics method and application[M]. Beijing: Chemical Industry Press, 2016. | |
[21] | 韩敏娜 . 基于多传感器数据融合的网络安全态势评估及预测模型研究[D]. 无锡:江南大学, 2013. |
HAN M N . The research on the assessment and prediction model of network security situation based on multi-sensor data fusion[D]. Wuxi:Jiangnan University, 2013. | |
[22] | 雷杰 . 网络安全威胁与态势评估方法研究[D]. 武汉:华中科技大学, 2008. |
LEI J . Research on the network security threat and situation assessment[D]. Wuhan:Huazhong University of Science and Technology, 2008. | |
[23] | 卢鹏 . 网络安全态势量化评估方法研究与应用[D]. 成都:电子科技大学, 2019. |
LU P . Research and application of network security situation quantitative evaluation method[D]. Chengdu:University of Electronic Science and Technology of China, 2019. | |
[24] | 赵迪 . 面向佯攻的虚实攻击链构造及检测方法的研究与实现[D]. 北京:北京交通大学, 2019. |
ZHAO D . Research and implementation of construction and detection methods of virtual attack and real attack chains for feint attacks[D]. Beijing:Beijing Jiaotong University, 2019. |
[1] | Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG. Research and implementation of reputation-based inter-domain routing selection mechanism [J]. Journal on Communications, 2023, 44(6): 47-56. |
[2] | Wei FAN, Cheng PENG, Dali ZHU, Yuqing WANG. Research on intrusion response strategy based on static Bayesian game in mobile edge computing network [J]. Journal on Communications, 2023, 44(2): 70-81. |
[3] | Haiyan KANG, Molan LONG. Research on network attack analysis method based on attack graph of absorbing Markov chain [J]. Journal on Communications, 2023, 44(2): 122-135. |
[4] | Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU. Fusion of Focal Loss’s cyber threat intelligence entity extraction [J]. Journal on Communications, 2022, 43(7): 85-92. |
[5] | Xiuzhang YANG, Guojun PENG, Zichuan LI, Yangqi LYU, Side LIU, Chenguang LI. Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF [J]. Journal on Communications, 2022, 43(6): 58-70. |
[6] | Zhibin FENG, Yuhua XU, Zhiyong DU, Xin LIU, Wen LI, Hao HAN, Xiaobo ZHANG. Active defense technology against intelligent jammer [J]. Journal on Communications, 2022, 43(10): 42-54. |
[7] | Tengfei ZHANG, Shunzheng YU. Research prospects of user information detection from encrypted traffic of mobile devices [J]. Journal on Communications, 2021, 42(2): 154-167. |
[8] | Xu CHENG, Yingying WANG, Nianjie ZHANG, Zhangjie FU, Beijing CHEN, Guoying ZHAO. Multi-level loss object tracking adversarial attack method based on spatial perception [J]. Journal on Communications, 2021, 42(11): 242-254. |
[9] | Tao HUANG, Jiang LIU, Shuo WANG, Chen ZHANG, Yunjie LIU. Survey of the future network technology and trend [J]. Journal on Communications, 2021, 42(1): 130-150. |
[10] | Zhiyong LUO,Xu YANG,Jiahui LIU,Rui XU. Network intrusion intention analysis model based on Bayesian attack graph [J]. Journal on Communications, 2020, 41(9): 160-169. |
[11] | Li ZHANG,Tian LIAO,Yejun HE. Dual-target WOA spectrum sharing algorithm based on Stackelberg game [J]. Journal on Communications, 2020, 41(9): 170-178. |
[12] | Lindong ZHAO,Wenqin ZHUANG,Jianxin CHEN,Liang ZHOU. Hierarchical task offloading in heterogeneous cellular network:modeling and optimization [J]. Journal on Communications, 2020, 41(4): 34-44. |
[13] | Ta LI,Youliang TIAN,Kang XIANG,Hongfeng GAO. Block-based fair payment scheme under delegation computation [J]. Journal on Communications, 2020, 41(3): 80-90. |
[14] | Hanxun ZHOU,Chen CHEN,Runze FENG,Junkun XIONG,Hong PAN,Wei GUO. Mobile malware traffic detection approach based on value-derivative GRU [J]. Journal on Communications, 2020, 41(1): 102-113. |
[15] | . Robust deployment strategy for security data collection agent [J]. Journal on Communications, 2019, 40(6): 51-65. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|