首页> 外文会议>Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC >Classification of computer attacks using a self-organizing map
【24h】

Classification of computer attacks using a self-organizing map

机译:使用自组织映射对计算机攻击进行分类

获取原文

摘要

As computer technology evolves and the threat of computer crimes increases, the apprehension and preemption of such violations become more and more difficult and challenging. To date, it appears that completely preventing breaches of security is unrealistic. Therefore, we must try to detect and classify these intrusions as they occur so that immediate actions may be taken to repair the damage and prevent further harm. One attempt at classifying these intrusions is MITRE's Common Vulnerabilities and Exposures (CVE) list that provides a common name for all publicly known security weaknesses. The CVE dictionary, however, is not taxonomy. The CVE list is organized in simple numerical order by date of acceptance. Each entry in the dictionary includes a unique CVE identification number, a text description of the vulnerability and any pertinent references. Creating a self-organizing map (SOM) using the text description allows us to order attack profiles with common features in the same general area of the output space. Attacks in the general neighborhood of one another should be able to be mitigated by similar means. Plotting attacks on a SOM also enables us to visually examine the placement of an attack relative to the four common classes of attacks (Denial of Service, Deception, Reconnaissance, and Unauthorized Access). Many attacks have features in common with more than one of these classes rather than corresponding directly to a single class. We have developed an effective technique to classify new attacks using a unique taxonomy, which breaks down threats into the four general categories, and the SOM created by the baseline CVE descriptions.
机译:随着计算机技术的发展和计算机犯罪威胁的增加,对此类违规行为的理解和抢占变得越来越困难和具有挑战性。迄今为止,似乎完全防止违反安全性的行为是不现实的。因此,我们必须设法在发生这些入侵时对其进行检测和分类,以便可以立即采取行动来修复损害并防止进一步的损害。 MITRE的“常见漏洞和披露(CVE)”列表是对这些入侵进行分类的一种尝试,该列表为所有众所周知的安全漏洞提供了通用名称。但是,CVE词典不是分类法。 CVE列表按接受日期以简单的数字顺序组织。词典中的每个条目都包含一个唯一的CVE标识号,该漏洞的文本描述以及所有相关参考。使用文本描述创建自组织映射(SOM),使我们可以在输出空间的同一常规区域中对具有共同特征的攻击配置文件进行排序。应该可以通过类似的方式来缓解彼此之间普遍存在的攻击。在SOM上绘制攻击图还使我们能够从视觉上检查与四种常见攻击类别(拒绝服务,欺骗,侦察和未经授权的访问)相关的攻击的位置。许多攻击具有与这些类别中的多个类别相同的功能,而不是直接对应于单个类别。我们已经开发出一种有效的技术,可以使用独特的分类法对新攻击进行分类,将威胁分为四大类,以及由基准CVE描述创建的SOM。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号