首页> 外文OA文献 >Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
【2h】

Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks

机译:检测隐匿攻击:有效监视计算机网络上的可疑​​活动

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Stealthy attackers move patiently through computer networks – taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a challenge. This paper presents an efficient monitoring technique for stealthy attacks. It investigates the feasibility of proposed method under number of different test cases and examines how design of the network affects the detection. A methodological way for tracing anonymous stealthy activities to their approximate sources is also presented. The Bayesian fusion along with traffic sampling is employed as a data reduction method. The proposed method has the ability to monitor stealthy activities using 10–20% size sampling rates without degrading the quality of detection.
机译:隐身攻击者需要耐心地通过计算机网络移动-花费数天,数周或数月才能完成其目标,从而避免被发现。随着网络规模和速度的扩大,监视此类攻击企图的挑战越来越大。本文提出了一种用于隐身攻击的有效监视技术。它研究了在不同测试案例中提出的方法的可行性,并研究了网络设计如何影响检测。还提供了一种方法,用于跟踪匿名隐身活动至其近似来源。贝叶斯融合与流量采样一起被用作数据缩减方法。所提出的方法具有使用10–20%大小的采样率来监视秘密活动的能力,而不会降低检测质量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号