首页> 外文学位 >Enhancing security in an IP backbone network.
【24h】

Enhancing security in an IP backbone network.

机译:增强IP骨干网的安全性。

获取原文
获取原文并翻译 | 示例

摘要

As the Internet continues to grow in size and complexity, the challenge of effectively provisioning, managing, and securing it has become inextricably linked to a deep understanding of Internet traffic. Due to vast amount of data, and wide diversity of end-hosts and services found in Internet traffic, we need techniques that can extract underlying structures and significant communication patterns.; In this dissertation, we propose a systematic methodology for profiling Internet backbone traffic that (1) not only automatically discovers significant behaviors (communication patterns) of interest from massive traffic data, (2) but also provides a plausible interpretation of these behaviors to aid security analysts in understanding and quickly identifying anomalous events of significance. For these purposes, a combination of data mining and information-theoretic techniques are employed to automatically cull useful information from largely unstructured data. An entropy-based adaptive algorithm is developed to extract significant clusters of interest. We introduce a behavior classification scheme that automatically groups clusters into classes based on communication patterns and feature distributions using relative uncertainty. In addition, we use dominant state analysis to uncover cluster structure for interpretive analyses. The analysis of traffic data collected from a variety of links at a large IP backbone network shows that the approach indeed provides a robust and meaningful way of characterizing and interpreting network behavior.; Given unwanted traffic revealed in exploit behavior profiles, we develop simple yet effective blocking strategies an IP network may pursue to reduce substantial exploit traffic. To demonstrate the operational feasibility, a real-time traffic profiling system has been designed and implemented. Experiment results show that under normal traffic conditions, resources on a commodity PC are sufficient to continuously process flow records and build behavior profiles for high-speed links in operational networks. For sudden traffic surges caused by events such as denial of service attacks or worm outbreaks, a novel profiling aware filtering algorithm is proposed to reduce the CPU and memory cost of the real-time system while maintaining high profiling accuracy. Thus, the profiling system can become an effective tool for security analysts with applications to critical problems such as detecting unknown security exploits and profiling unwanted traffic.
机译:随着Internet的规模和复杂性不断增长,有效配置,管理和保护Internet的挑战已经与对Internet流量的深刻理解密不可分。由于存在大量数据,并且在Internet流量中发现了各种各样的终端主机和服务,因此我们需要能够提取底层结构和重要通信模式的技术。在本文中,我们提出了一种系统的方法来分析Internet骨干网流量:(1)不仅自动从海量流量数据中发现重要的重要行为(通信模式),(2),而且对这些行为进行了合理的解释以帮助安全分析人员在了解和快速识别异常事件中具有重要意义。为了这些目的,采用了数据挖掘和信息理论技术的结合来从大量非结构化数据中自动剔除有用信息。开发了一种基于熵的自适应算法来提取重要的关注簇。我们介绍一种行为分类方案,该方案使用相对不确定性根据通信模式和特征分布自动将聚类划分为类。此外,我们使用优势状态分析来揭示聚类结构以进行解释性分析。对从大型IP骨干网的各种链路收集的流量数据进行的分析表明,该方法确实提供了表征和解释网络行为的强大而有意义的方法。给定漏洞利用行为概要文件中显示的有害流量,我们将开发一种简单而有效的阻止策略,IP网络可以采用这种策略来减少大量漏洞利用流量。为了证明操作的可行性,已经设计并实施了实时交通分析系统。实验结果表明,在正常的流量条件下,商用PC上的资源足以连续处理流量记录并为运营网络中的高速链路建立行为配置文件。对于由拒绝服务攻击或蠕虫爆发等事件引起的突发流量激增,提出了一种新颖的可感知概要分析的过滤算法,以减少实时系统的CPU和内存成本,同时保持较高的概要分析精度。因此,性能分析系统可以成为安全分析人员的有效工具,可以解决诸如检测未知安全漏洞和分析不需要的流量等关键问题。

著录项

  • 作者

    Xu, Kuai.;

  • 作者单位

    University of Minnesota.;

  • 授予单位 University of Minnesota.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2006
  • 页码 125 p.
  • 总页数 125
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号