首页> 外文期刊>Journal of network and computer applications >Discovery and prevention of attack episodes by frequent episodes mining and finite state machines
【24h】

Discovery and prevention of attack episodes by frequent episodes mining and finite state machines

机译:通过频繁的事件挖掘和有限状态机发现和预防攻击事件

获取原文
获取原文并翻译 | 示例

摘要

This paper proposes a framework that applies frequent episode rules, implemented by finite state machines (FSMs), to design a real-time network-based intrusion prevention system (NIPS) for Probe/ Exploit (hacking) intrusion. This type of Probe/Exploit (hacking) intrusion is executed by a series of relevant actions that occur in some sequence. In frequent episode rules mining, data are viewed as a sequence of events, where each event has an associated time of occurrence; thus, such mining technique has significant effect on discovering sophisticated Probe/Exploit intrusion attacks. Prior to a devastating attack on a victim's computer, the hacker must gather information about the victim, and transfer instructions or files to the victim's computer. The proposed system could detect such abnormal episodes and repel hackers from the firewall before they are able to launch a deadly attack. In one network service (a corresponding port number), mine frequent episode rules from the log files of a commercial honeypot system, then refine the rules, which eventually constructs a finite state machine to protect the network service, according to the refined rules. During implementation and simulation, this study applied the framework focus on protecting a Server Message Block (SMB) protocol, which is the most important protocol in Microsoft's Windows Network. As confirmed in the experiments, this study successfully mined sophisticated intrusion episodes and demonstrated the efficiency of tracing connections by a FSM. The framework of intrusion prevention proposed in this paper can be modified straightforward to protect other network services.
机译:本文提出了一个框架,该框架应用由有限状态机(FSM)实施的频繁事件规则,以设计用于探测/漏洞(hacking)入侵的基于网络的实时入侵防御系统(NIPS)。这种类型的探测/利用(黑客)入侵是由一系列按顺序发生的相关动作执行的。在频繁的情节规则挖掘中,数据被视为一系列事件,其中每个事件都有关联的发生时间;因此,这种挖掘技术对发现复杂的Probe / Exploit入侵攻击具有重大影响。在对受害者的计算机进行破坏性攻击之前,黑客必须收集有关受害者的信息,并将指令或文件传输到受害者的计算机。提议的系统可以检测到此类异常事件,并在防火墙发起致命攻击之前将其从防火墙中驱除。在一个网络服务(相应的端口号)中,从商业蜜罐系统的日志文件中挖掘频繁事件规则,然后对其进行完善,最终根据改进后的规则构建一个有限状态机来保护网络服务。在实施和仿真过程中,本研究将框架重点放在保护服务器消息块(SMB)协议上,该协议是Microsoft Windows网络中最重要的协议。实验证实,该研究成功挖掘了复杂的入侵事件,并证明了通过FSM追踪连接的效率。本文提出的入侵防御框架可以直接修改以保护其他网络服务。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号