...
首页> 外文期刊>Journal of network and computer applications >A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks
【24h】

A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks

机译:用于识别外围计算机网络攻击的似然比异常检测器

获取原文
获取原文并翻译 | 示例

摘要

The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. However, many anomaly detectors do not take into account plausible attacker behavior. As a result, anomaly detectors are prone to a large number of false positives due to unusual but benign activity. This paper first introduces a stochastic model of attacker behavior which is motivated by real world attacker traversal. Then, we develop a likelihood ratio detector that compares the probability of observed network behavior under normal conditions against the case when an attacker has possibly compromised a subset of hosts within the network. Since the likelihood ratio detector requires integrating over the time each host becomes compromised, we illustrate how to use Monte Carlo methods to compute the requisite integral. We then present Receiver Operating Characteristic (ROC) curves for various network parameterizations that show for any rate of true positives, the rate of false positives for the likelihood ratio detector is no higher than that of a simple anomaly detector and is often lower. We conclude by demonstrating the superiority of the proposed likelihood ratio detector when the network topologies and parameterizations are extracted from real-world networks. (C) 2016 Elsevier Ltd. All rights reserved.
机译:快速检测企业计算机网络防火墙内的攻击者至关重要。异常检测器通过量化与正常网络行为的基线统计模型的偏差并在观察到的数据明显偏离基线模型时发出入侵信号来解决此问题。但是,许多异常检测器并未考虑到合理的攻击者行为。结果,由于异常但良性的活动,异常检测器易于产生大量误报。本文首先介绍了攻击者行为的随机模型,该模型由现实世界中的攻击者遍历驱动。然后,我们开发了一种似然比检测器,该检测器将正常情况下观察到的网络行为的概率与攻击者可能损害了网络内主机的子集的情况进行了比较。由于似然比检测器需要在每个主机受损的时间内进行积分,因此我们说明了如何使用蒙特卡洛方法来计算必要的积分。然后,我们给出了各种网络参数化的接收器工作特性(ROC)曲线,这些曲线显示出对于任何真阳性率,似然比检测器的假阳性率均不高于简单异常检测器,而且通常更低。通过论证当从实际网络中提取网络拓扑和参数化时提出的似然比检测器的优越性,可以得出结论。 (C)2016 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号