【24h】

FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data Using Network Flows

机译:FlowHacker:使用网络流检测大流量数据中的未知网络攻击

获取原文
获取原文并翻译 | 示例

摘要

Traditional Network Intrusion Detection Systems (NIDSs) inspect the payload of the packets looking for known intrusion signatures or deviations from normal behavior, but inspecting traffic at the current speed of Internet Service Provider (ISP) networks is difficult or even unfeasible. This paper presents an approach to detect malicious traffic and identify malicious hosts by inspecting flows, leveraging a combination of unsupervised machine learning and threat intelligence, without requiring either previous knowledge about attacks or traffic without attacks. The approach was implemented in the FlowHacker NIDS and evaluated with two kinds of traffic flows: synthetic traffic flows and real ISP traffic flows.
机译:传统的网络入侵检测系统(NIDS)检查数据包的有效载荷以查找已知的入侵签名或与正常行为的偏离,但是以Internet服务提供商(ISP)网络的当前速度检查流量非常困难,甚至不可行。本文提出了一种方法,该方法可以通过检查流,利用无监督机器学习和威胁情报的组合来检测流量,从而识别恶意主机,而无需事先了解攻击或无需攻击即可获得流量。该方法在FlowHacker NIDS中实现,并通过两种流量进行评估:合成流量和实际ISP流量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号