首页> 外文学位 >Analyzing cyber-attacks using feature similarity: A flow based detection approach.
【24h】

Analyzing cyber-attacks using feature similarity: A flow based detection approach.

机译:使用特征相似性分析网络攻击:一种基于流的检测方法。

获取原文
获取原文并翻译 | 示例

摘要

The advancements and improvement in network technology has given rise to new challenges in cyber- security, by increasing the risk of cyber-attacks. Intruders are exploiting vulnerabilities to devise novel and unknown cyber-attacks to perform malicious activities. Due to increasing network traffic the current packet-based Intrusion Detection Systems (IDSs) spend significant amount of time analyzing packets to detect intrusions. This thesis attempts to identify relevancy between cyber-attacks using binary similarity coefficients using a network flow based approach. A network flow is a sequence of packets between a given source and destination in one direction only that share certain characteristics. The discovery of relevancy between attacks in network flows helps in correlating the suspicious attack events, as it is measured by similarity coefficients. A prototype system has been implemented and evaluated using several similarity coefficients for suspicious events to identify incoming cyber-attacks.
机译:网络技术的进步和改进通过增加网络攻击的风险,给网络安全带来了新的挑战。入侵者正在利用漏洞设计新颖和未知的网络攻击来执行恶意活动。由于网络流量的增加,当前的基于数据包的入侵检测系统(IDS)花费大量时间来分析数据包以检测入侵。本文试图使用基于网络流的方法,使用二进制相似系数来识别网络攻击之间的相关性。网络流是仅在一个方向上的给定源和目标之间的一组数据包序列,它们共享某些特征。发现网络流中攻击之间的相关性有助于关联可疑攻击事件,因为它是通过相似系数来衡量的。一个原型系统已被实施并使用可疑事件的几个相似系数进行评估,以识别传入的网络攻击。

著录项

  • 作者

    Kawatkar, Adwait Satish.;

  • 作者单位

    University of Maryland, Baltimore County.;

  • 授予单位 University of Maryland, Baltimore County.;
  • 学科 Information science.
  • 学位 M.S.
  • 年度 2015
  • 页码 59 p.
  • 总页数 59
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:52:39

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号