首页> 外文会议>International Symposium on Resilient Control Systems >Intruder detection based on graph structured hypothesis testing
【24h】

Intruder detection based on graph structured hypothesis testing

机译:基于曲线图结构化假设检测的入侵者检测

获取原文

摘要

Anomaly based network intruder detection is considered. In particular, we view anomaly detection as a statistical hypothesis testing problem. The null hypothesis associated with each host is that it is acting normally, while the alternative is that the host is acting abnormally. When considered in relation to the network traffic, these host-level hypotheses form a graphically structured hypothesis testing problem. Some network intrusions will form linked regions in this graph where the null hypotheses are false. This will be the case when an intruder traverses the network, or when a coordinated attack is performed targeting the same set of machines. Other network intrusions can lead to multiple unrelated hosts acting abnormally, such as when multiple attackers are acting more or less independently. We consider model based approaches for detecting these different types of disruptions to the network activity. For instance, network traversal is modeled as a random walk through the network stringing together multiple abnormally acting machines. A coordinated attack targeting a single machine is modeled as multiple anomalous hosts connecting to a randomly selected target. The advantage of modeling the attacker patterns is that, under ideal conditions, this defines an optimal detector of the intruders. This optimal detector depends on unknown parameters, and is therefore less attractive for practical use. We describe pragmatic approaches that, in simulations, achieve close to optimal detection rates. The methodology is applied to a real-world network intrusion, clearly identifying the attack.
机译:考虑了基于异常的网络入侵者检测。特别是,我们将异常检测视为统计假设检测问题。与每个主机相关联的零假设是它正常起作用,而替代方案是主机在异常作用。当考虑与网络流量有关时,这些主机级假设形成了图形结构的假设检测问题。一些网络入侵将在此图中形成链接区域,其中null假设是假的。当入侵者遍历网络时,或者当针对同一组机器执行协调攻击时,这将是这种情况。其他网络入侵可以导致多个不相关的主机异常行动,例如当多个攻击者的行为或多或少地独立起作用。我们考虑基于模型的方法,用于检测网络活动的这些不同类型的中断。例如,网络遍历以随机散步通过网络串在一起,将多个异常作用机器进行建模。针对单个机器的协调攻击被建模为连接到随机选择的目标的多个异常主机。建模攻击者模式的优点是,在理想条件下,这定义了入侵者的最佳检测器。这种最佳探测器取决于未知参数,因此对实际使用的吸引力不那么有吸引力。我们描述了在模拟中实现近距离最佳检测率的务实方法。该方法应用于真实网络的网络入侵,清楚地识别攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号