首页> 外文会议>IEEE Systems and Information Engineering Design Symposium >Topic modeling of SSH logs using latent dirichlet allocation for the application in cyber security
【24h】

Topic modeling of SSH logs using latent dirichlet allocation for the application in cyber security

机译:SSH日志的主题建模,使用潜在狄利克雷分配为网络安全中的应用程序

获取原文

摘要

Cyber intrusions are one of the main causes of fear across the internet and now, due to the substantial increase in network traffic, detection of each unauthorized access has become extremely difficult. Brute-force attacks are the most common form of malicious traffic. To prevent such attacks and detect them in real time many new techniques have been developed. The majority of these techniques monitor the sequential transfers between users/IPs and the network. However, though many networks are now monitoring their logs and can identify when brute-force attacks occur, they cannot provide more detailed information about the attack (such as where and how) without some form of direct visual inspection of the logs. In this paper, we explore a Latent Dirichlet Allocation as a form of topic modeling of IP addresses through SSH authentication logs with the final goal of automating classifications of users. Using textual topics or the “top words” associated with logs, we differentiate legitimate users and brute-attackers users according to their IP addresses and discuss the potential of topic modelling for identifying and further classification of cyber threats.
机译:网络入侵是整个互联网上恐惧的主要原因之一,现在,由于网络流量的大量增加,检测每个未经授权的访问变得极为困难。蛮力攻击是恶意流量的最常见形式。为了防止这种攻击并实时检测到它们,已经开发了许多新技术。这些技术中的大多数监视用户/ IP与网络之间的顺序传输。但是,尽管许多网络现在正在监视其日志并可以识别何时发生暴力攻击,但是如果不采取某种形式的直观日志检查,它们就无法提供有关攻击的更详细信息(例如,位置和方式)。在本文中,我们探索了一种潜在的Dirichlet分配,它是通过SSH身份验证日志对IP地址进行主题建模的一种形式,其最终目标是实现用户分类的自动化。通过使用文本主题或与日志关联的“热门词汇”,我们根据合法用户和粗暴攻击者的IP地址来区分它们,并讨论了主题建模在识别和进一步分类网络威胁方面的潜力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号