首页> 外文期刊>Future generation computer systems >Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics
【24h】

Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics

机译:基于半监督学习和复杂网络特征的高级持续威胁攻击的多阶段建模和检测

获取原文
获取原文并翻译 | 示例

摘要

Advanced Persistent Threats (APT) present the most sophisticated types of attacks to modern networks which have proved to be very challenging to address. Using sophisticated attack techniques, attackers remotely control infected machines and exfiltrate sensitive information from organizations and governments. Security products deployed by enterprise networks based on traditional defenses often fail at detecting APT infections because of the dynamic nature of the APT attack process. To overcome the current limitations of attack network dynamics faced in APT studies, an innovative APT attack detection model based on a semi-supervised learning approach and complex networks characteristics is proposed in this paper. The entire targeted network is modeled as a small-world network and the evolving APT-Attack Network (APT-AN) as a scale-free network. Finite state machines are employed to model the state transitions of the nodes in the time domain in order to characterize the state changes during the APT attack process. The effectiveness of the model is demonstrated by applying it to real-world data from a large-scale enterprise network consisting of 17,684 hosts from the Los Alamos security lab. The proposed approach analyzes efficiently the large-scale dataset to reveal APT attack characteristics between the command and control center and the victim hosts. The final result is a ranked list of suspicious hosts participating in APT attack activities. The average detection precision of three APT stage is 90.5% in our proposed APT detection framework. The results show that the model can effectively detect the suspicious hosts at different stages of the APT attack process.
机译:高级持久威胁(APT)向现代网络提供了最复杂的攻击类型,事实证明,这些攻击很难解决。攻击者使用复杂的攻击技术远程控制受感染的计算机,并从组织和政府中窃取敏感信息。由于APT攻击过程的动态性质,基于传统防御的企业网络部署的安全产品通常无法检测到APT感染。为了克服当前APT研究面临的攻击网络动态的局限性,本文提出了一种基于半监督学习方法和复杂网络特征的创新APT攻击检测模型。整个目标网络被建模为小型世界网络,而不断发展的APT-攻击网络(APT-AN)被建模为无规模网络。有限状态机用于在时域中对节点的状态转换进行建模,以表征APT攻击过程中的状态变化。通过将模型应用于来自洛斯阿拉莫斯安全实验室的17684个主机的大规模企业网络的真实数据,证明了该模型的有效性。所提出的方法有效地分析了大型数据集,以揭示指挥和控制中心与受害者主机之间的APT攻击特征。最终结果是参与APT攻击活动的可疑主机的排名列表。在我们提出的APT检测框架中,三个APT阶段的平均检测精度为90.5%。结果表明,该模型可以有效地检测APT攻击过程中不同阶段的可疑主机。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号