首页> 外文会议>International conference on information systems security >Monitoring for Slow Suspicious Activities Using a Target Centric Approach
【24h】

Monitoring for Slow Suspicious Activities Using a Target Centric Approach

机译:使用目标中心方法监视缓慢的可疑活动

获取原文

摘要

Slow, suspicious and increasingly sophisticated malicious activities on modern networks are incredibly hard to detect. Attacker tactics such as source collusion and source address spoofing are common. Effective attribution of attacks therefore is a real challenge. To address this we propose an approach to utilise destination information of activities together with a data fusion technique to combine the output of several information sources to a single profile score. The main contribution of the paper is proposing a radical shift to the focus of analysis. Experimental results offer a promise for target centric monitoring that does not have to rely on possible source aggregation.
机译:在现代网络上,缓慢,可疑和日益复杂的恶意活动难以检测。诸如源代码合谋和源地址欺骗之类的攻击者策略很常见。因此,攻击的有效归因是一个真正的挑战。为了解决这个问题,我们提出了一种利用活动的目的地信息以及数据融合技术来将多个信息源的输出组合到单个配置文件得分中的方法。本文的主要贡献是提出了从根本上转移到分析重点的建议。实验结果为以目标为中心的监视提供了希望,而不必依赖可能的源聚集。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号