首页> 外文学位 >CACTUSS: Clustering of attack tracks using significant services .
【24h】

CACTUSS: Clustering of attack tracks using significant services .

机译:仙人掌:使用重要服务对攻击路径进行聚类。

获取原文
获取原文并翻译 | 示例

摘要

Network analysts are bombarded with large amounts of low level data, posing great challenges for them to differentiate and recognize critical multistage attacks. Multistage attacks are performed by hackers to compromise one or more machines in a network to gradually gain access to critical information or network operation hidden behind layers of firewall rules. These multistage attacks, composed of correlated Intrusion Detection System (IDS) alerts, can be diverse in the way they progress and penetrate the network. There exists no current literature defining how these diverse multistage attacks may be classified or categorized. This work aims to perform unsupervised learning to cluster and identify types of multistage attacks.;Multistage attacks may attack services of different types, often indicating the behavior of attack penetration into the network. Divisive Hierarchical Clustering has been shown to effectively uncover underlying community structure of entities sharing similar features. This work investigates the use of attacked services as the feature and performs Divisive Hierarchical Clustering to identify groups of similar multistage attacks. The notion of social network analysis is leveraged to determine the optimal community structure with the highest modularity. The resulting clusters and dendrograms provide not only insights on characterizing multistage attacks, but also a means of reducing the data volume while enhancing the level of analysis. The outcomes of the proposed methodology are expected to improve situation awareness in the presence of many diverse multistage attacks.
机译:网络分析人员被大量低级数据轰炸,这对他们区分和识别关键的多阶段攻击构成了巨大挑战。黑客进行多阶段攻击,以破坏网络中的一台或多台计算机,从而逐渐访问隐藏在防火墙规则层后面的关键信息或网络操作。这些由相关的入侵检测系统(IDS)警报组成的多级攻击,其进行和渗透网络的方式可以多种多样。当前没有文献定义如何对这些不同的多阶段攻击进行分类或分类。这项工作旨在执行无监督学习,以聚类和识别多阶段攻击的类型。多阶段攻击可能会攻击不同类型的服务,通常表明攻击渗透到网络的行为。分裂层次聚类已显示可有效发现共享相似功能的实体的底层社区结构。这项工作调查了被攻击服务作为功能的使用,并执行了区分层次聚类以识别相似的多阶段攻击的组。利用社交网络分析的概念来确定具有最高模块化的最佳社区结构。由此产生的簇和树状图不仅提供了表征多级攻击的见解,而且还提供了一种减少数据量,同时提高分析水平的方法。预期所提出方法的结果将在存在多种多样的多阶段攻击的情况下提高态势意识。

著录项

  • 作者

    Murphy, Christopher Thomas.;

  • 作者单位

    Rochester Institute of Technology.;

  • 授予单位 Rochester Institute of Technology.;
  • 学科 Engineering Computer.;Information Technology.
  • 学位 M.S.
  • 年度 2009
  • 页码 74 p.
  • 总页数 74
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 公共建筑;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号