首页> 外文会议>2011 4th IFIP International Conference on New Technologies, Mobility and Security >Steps Towards Autonomous Network Security: Unsupervised Detection of Network Attacks
【24h】

Steps Towards Autonomous Network Security: Unsupervised Detection of Network Attacks

机译:自主网络安全的步骤:网络攻击的无监督检测

获取原文
获取外文期刊封面目录资料

摘要

The unsupervised detection of network attacks represents an extremely challenging goal. Current methods rely on either very specialized signatures of previously seen attacks, or on expensive and difficult to produce labeled traffic data-sets for profiling and training. In this paper we present a completely unsupervised approach to detect attacks, without relying on signatures, labeled traffic, or training. The method uses robust clustering techniques to detect anomalous traffic flows, sequentially captured in a temporal sliding-window basis. The structure of the anomaly identified by the clustering algorithms is used to automatically construct specific filtering rules that characterize its nature, providing easy-to-interpret information to the network operator. In addition, these rules are combined to create an anomaly signature, which can be directly exported towards standard security devices like IDSs, IPSs, and/or Firewalls. The clustering algorithms are highly adapted for parallel computation, which permits to perform the unsupervised detection and construction of signatures in an on-line basis. We evaluate the performance of this new approach to discover and to build signatures for different network attacks without any previous knowledge, using real traffic traces. Results show that knowledge-independent detection and characterization of network attacks is possible, opening the door to a whole new generation of autonomous security algorithms.
机译:对网络攻击的无监督检测代表了一个极具挑战性的目标。当前的方法要么依赖于以前见过的攻击的非常专业的签名,要么依赖于昂贵且难以生成标记的流量数据集以进行概要分析和训练。在本文中,我们提出了一种完全不受监督的方法来检测攻击,而无需依赖签名,标记的流量或训练。该方法使用鲁棒的聚类技术来检测异常流量,这些流量以时间滑动窗口为基础依次捕获。由聚类算法识别的异常结构用于自动构造表征其性质的特定过滤规则,从而为网络运营商提供易于理解的信息。此外,这些规则被组合在一起以创建异常签名,可以将其直接导出到IDS,IPS和/或防火墙之类的标准安全设备。聚类算法非常适合并行计算,从而可以在线执行签名的无监督检测和构造。我们评估这种新方法的性能,以使用真实的流量跟踪信息来发现和构建针对各种网络攻击的特征,而无需任何先验知识。结果表明,与知识无关的网络攻击检测和表征是可能的,这为新一代的自主安全算法打开了大门。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号