首页> 外文会议>IFIP/IEEE Symposium on Integrated Network and Service Management >Graph-based malicious login events investigation
【24h】

Graph-based malicious login events investigation

机译:基于图的恶意登录事件调查

获取原文

摘要

A large body of research has been accomplished on detecting malicious events, attacks, threats, or botnets. Different techniques and approaches have been proposed to detect them such as machine-learning-based, or rule-based. However, there is a lack of sophisticated techniques for investigating malicious events and understanding the root cause of attacks. In this paper, we propose a knowledge discovery approach for investigating and visualizing malicious authentication events. The approach is based on data mining techniques on attacks in order to extract the behavior of malicious authentication. We also propose a novel graph-based representation method that helps highlight attack scenarios. The evaluation is performed on a publicly available large dataset, where we analyze behavior of malicious authentication events. The results are useful for security experts in order to improve the existing solutions by making them robust.
机译:关于检测恶意事件,攻击,威胁或僵尸网络的大量研究已经完成。已经提出了不同的技术和方法来检测它们,例如基于机器学习的或基于规则的。但是,缺乏用于调查恶意事件和了解攻击根本原因的复杂技术。在本文中,我们提出了一种用于调查和可视化恶意身份验证事件的知识发现方法。该方法基于针对攻击的数据挖掘技术,以提取恶意身份验证的行为。我们还提出了一种新颖的基于图的表示方法,可帮助突出显示攻击情形。评估是在可公开获得的大型数据集上进行的,我们在其中分析恶意身份验证事件的行为。该结果对于安全专家而言非常有用,可以通过使其健壮性来改进现有解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号