首页> 外文会议>International Symposium on Resilient Control Systems >LINEBACkER: Bio-inspired data reduction toward real time network traffic analysis
【24h】

LINEBACkER: Bio-inspired data reduction toward real time network traffic analysis

机译:Linebacker:生物启发数据降低了实时网络流量分析

获取原文

摘要

One essential component of resilient cyber applications is the ability to detect adversaries and protect systems with the same flexibility adversaries will use to achieve their goals. Current detection techniques do not enable this degree of flexibility because most existing applications are built using exact or regular-expression matching to libraries of rule sets. Further, network traffic defies traditional cyber security approaches that focus on limiting access based on the use of passwords and examination of lists of installed or downloaded programs. These approaches do not readily apply to network traffic occurring beyond the access control point, and when the data in question are combined control and payload data of ever increasing speed and volume. Manual analysis of network traffic is not normally possible because of the magnitude of the data that is being exchanged and the length of time that this analysis takes. At the same time, using an exact matching scheme to identify malicious traffic in real time often fails because the lists against which such searches must operate grow too large. In this work, we propose an adaptation of biosequence alignment as an alternative method for cyber network detection based on similarity-measuring algorithms for gene sequence analysis. These methods are ideal because they were designed to identify similar but non-identical sequences. We demonstrate that our method is generally applicable to the problem of network traffic analysis by illustrating its use in two different areas based on different attributes of network traffic. Our approach provides a logical framework for organizing large collections of network data, prioritizing traffic of interest to human analysts, and makes it possible to discover traffic signatures without the bias introduced by expert-directed signature generation. Pattern recognition on reduced representations of network traffic offers a fast, efficient, and more robust way to detect anomalies.
机译:弹性网络应用的一个基本组成部分是检测对手的能力和保护具有相同灵活性对手的系统,将用于实现其目标。当前的检测技术不实现这种程度的灵活性,因为大多数现有应用程序都是使用精确或常规表达式与规则集的库建立的。此外,网络流量无视传统的网络安全方法,该方法专注于基于使用密码和安装或下载程序列表的限制访问。这些方法不容易应用于超出访问控制点的网络流量,并且当有问题的数据组合时,速度和卷的有关的控制和有效载荷数据。由于正在交换的数据的大小以及此分析所需的时间长度,因此通常可能对网络流量分析不一致。同时,使用完全匹配的方案以实时识别恶意流量通常失败,因为这些搜索必须运行太大的列表。在这项工作中,我们提出了基于基因序列分析的相似度测量算法作为网络网络检测的替代方法的改编。这些方法是理想的,因为它们被设计成识别类似但非相同的序列。我们证明我们的方法通常适用于通过基于网络流量的不同属性的两个不同区域的使用来应用网络流量分析的问题。我们的方法提供了组织大量网络数据的逻辑框架,优先考虑人类分析师的流量,并且可以在没有专家定向签名生成引入的情况下发现流量签名。关于网络流量减少表示的模式识别提供了检测异常的快速,高效,更强大的方式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号