首页> 外文期刊>Computers and Electrical Engineering >Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
【24h】

Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks

机译:检测隐形攻击:有效监视计算机网络上的可疑​​活动

获取原文
获取原文并翻译 | 示例
           

摘要

Stealthy attackers move patiently through computer networks - taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a challenge. This paper presents an efficient monitoring technique for stealthy attacks. It investigates the feasibility of proposed method under number of different test cases and examines how design of the network affects the detection. A methodological way for tracing anonymous stealthy activities to their approximate sources is also presented. The Bayesian fusion along with traffic sampling is employed as a data reduction method. The proposed method has the ability to monitor stealthy activities using 10-20% size sampling rates without degrading the quality of detection. (C) 2015 Elsevier Ltd. All rights reserved.
机译:隐身攻击者会耐心地通过计算机网络移动-花费数天,数周或数月才能完成其目标,从而避免被发现。随着网络规模和速度的扩大,监视此类攻击企图的挑战越来越大。本文提出了一种用于隐身攻击的有效监视技术。它研究了在不同测试案例中提出的方法的可行性,并研究了网络设计如何影响检测。还提供了一种方法,用于跟踪匿名隐身活动至其近似来源。贝叶斯融合与流量采样一起被用作数据缩减方法。所提出的方法具有使用10-20%大小的采样率监视秘密活动的能力,而不会降低检测质量。 (C)2015 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号