CN106506567A - A proactive discovery method for covert network attacks based on behavior evaluation - Google Patents
A proactive discovery method for covert network attacks based on behavior evaluation Download PDFInfo
- Publication number
- CN106506567A CN106506567A CN201710021802.4A CN201710021802A CN106506567A CN 106506567 A CN106506567 A CN 106506567A CN 201710021802 A CN201710021802 A CN 201710021802A CN 106506567 A CN106506567 A CN 106506567A
- Authority
- CN
- China
- Prior art keywords
- behavior
- mobile subscriber
- insincere
- attack
- mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域technical field
本发明属于移动互联网技术领域,尤其涉及一种基于行为评判的隐蔽式网络攻击主动发现方法。The invention belongs to the technical field of mobile Internet, and in particular relates to a method for actively discovering concealed network attacks based on behavior evaluation.
背景技术Background technique
由于当前移动互联网环境下隐蔽式网络攻击还处于探索研究阶段,甚至短期内也找不到较好的解决方法。大量的实践证明,人类的行为具有周期性和规律性,每隔一段时间内所表现出来的行为是相近的;而作为与人类关系密切的移动互联网也越来越符合人类行为的某些特性,移动互联网中的移动用户的某些行为也具有周期性和规律性。同时考虑到现有的知识发现方法、黑名单检测法、白名单检测法、数字签名检测法、沙箱检测技术等都无法应对未知的隐蔽式网络攻击,也很难检测到敌对方的攻击行为,隐蔽式网络攻击手段或方法发展日新月异,其表现出来的攻击行为也层出不穷,传统基于已知的攻击手段或方法的知识发现方法、黑名单检测法、白名单检测法、数字签名检测法、沙箱检测技术等不能满足发现或检测复杂网络环境下新型的攻击手段或方法。这些检测法都是在传统网络攻击检测及防御方法基础上的改进,并没有质的突破,为传统基于已知的攻击手段或方法的知识发现方法、黑名单检测法、白名单检测法、数字签名检测法、沙箱检测技术等都只能发现或检测已知的攻击,很难检测及防御目前日新月异的隐蔽式网络攻击;而行为特征检测是隐蔽式网络攻击主动发现最根本的技术(行为特征检测首先是通过对移动用户行为进行统计和分析;然后结合隐蔽式网络攻击行为规律对移动用户行为进行检测(与攻击行为特征库中的规则相比较);最后根据检测结果发现是否具有攻击行为,只能发现或检测已知的攻击行为。现有的知识发现方法、黑名单检测法、白名单检测法、数字签名检测法、沙箱检测技术等无法发现或检测未知的网络攻击(这是因为传统的知识发现方法、黑名单检测法、白名单检测法、数字签名检测法、沙箱检测技术等只能发现或检测已知的攻击手段或方法)Since covert network attacks in the current mobile Internet environment are still in the stage of exploration and research, no better solution can be found even in the short term. A large number of practices have proved that human behavior is cyclical and regular, and the behaviors shown at intervals are similar; and the mobile Internet, which is closely related to human beings, is more and more in line with certain characteristics of human behavior. Certain behaviors of mobile users in the mobile Internet also have periodicity and regularity. At the same time, considering that the existing knowledge discovery methods, blacklist detection methods, whitelist detection methods, digital signature detection methods, sandbox detection technologies, etc. cannot cope with unknown hidden network attacks, and it is also difficult to detect the attack behavior of the hostile party. , The means or methods of concealed network attacks are developing rapidly, and the attack behaviors are also emerging in an endless stream. Traditional knowledge discovery methods based on known attack means or methods, blacklist detection methods, whitelist detection methods, digital signature detection methods, sand Box detection technology cannot satisfy the discovery or detection of new attack means or methods in a complex network environment. These detection methods are improvements on the basis of traditional network attack detection and defense methods, and there is no qualitative breakthrough. They are traditional knowledge discovery methods based on known attack methods or methods, blacklist detection methods, whitelist detection methods, digital Signature detection methods and sandbox detection technologies can only detect or detect known attacks, and it is difficult to detect and defend against the current ever-changing covert network attacks; and behavioral feature detection is the most fundamental technology for active discovery of covert network attacks (behavioral Feature detection is firstly through statistics and analysis of mobile user behavior; then combined with covert network attack behavior rules to detect mobile user behavior (compared with the rules in the attack behavior feature database); finally, according to the detection results, it is found whether there is an attack behavior , can only discover or detect known attacks. Existing knowledge discovery methods, blacklist detection methods, whitelist detection methods, digital signature detection methods, sandbox detection techniques, etc. cannot discover or detect unknown network attacks (this is Because traditional knowledge discovery methods, blacklist detection methods, whitelist detection methods, digital signature detection methods, sandbox detection techniques, etc. can only discover or detect known attack means or methods)
综上所述,现有的知识发现方法、黑名单检测法、白名单检测法、数字签名检测法、沙箱检测技术等都无法应对未知的隐蔽式网络攻击,也很难检测到敌对方的攻击行为。To sum up, the existing knowledge discovery methods, blacklist detection methods, whitelist detection methods, digital signature detection methods, sandbox detection technologies, etc. cannot cope with unknown hidden network attacks, and it is difficult to detect the enemy's aggressive behavior.
发明内容Contents of the invention
本发明的目的在于提供一种基于行为评判的隐蔽式网络攻击主动发现方法,旨在解决现有的知识发现方法、黑名单检测法、白名单检测法、数字签名检测法、沙箱检测技术等都无法应对未知的隐蔽式网络攻击,也很难检测到敌对方的攻击行为的问题。The purpose of the present invention is to provide a method for actively discovering concealed network attacks based on behavior evaluation, aiming to solve the existing knowledge discovery methods, blacklist detection methods, whitelist detection methods, digital signature detection methods, sandbox detection technologies, etc. Neither can cope with unknown covert network attacks, and it is also difficult to detect the attack behavior of the hostile party.
本发明是这样实现的,一种基于行为评判的隐蔽式网络攻击主动发现方法,所述基于行为评判的隐蔽式网络攻击主动发现方法包括以下步骤:The present invention is achieved in this way, a method for actively discovering a concealed network attack based on behavioral judgment, the method for actively discovering a concealed network attack based on behavioral judgment includes the following steps:
步骤一,采用模糊聚类算法对通过“移动用户行为可信评判”结果“不可信”的移动用户依据其行为特征进行分类;Step 1, using fuzzy clustering algorithm to classify mobile users who pass the "credible evaluation of mobile user behavior" results as "unreliable" according to their behavior characteristics;
步骤二,从被判断为“不可信”的移动用户中挖掘发现攻击者;针对各移动用户行为特征定义为相应的攻击行为因子,建立移动用户相应的攻击行为度量指标,并引入基于模糊聚类的挖掘算法,采用基于模糊聚类的隐蔽式网络攻击行为深度挖掘算法;Step 2: mining and discovering attackers from the mobile users judged as "untrustworthy"; defining the behavior characteristics of each mobile user as corresponding attack behavior factors, establishing the corresponding attack behavior measurement indicators of mobile users, and introducing fuzzy clustering based The mining algorithm adopts the deep mining algorithm of concealed network attack behavior based on fuzzy clustering;
步骤三,计算“不可信”移动用户的攻击行为因子,判定“不可信”移动用户是否存在某种攻击;如果该“不可信”移动用户有攻击行为,则采取相应的应对策略。Step 3: Calculate the attack behavior factor of the "untrustworthy" mobile user, and determine whether there is some kind of attack in the "untrustworthy" mobile user; if the "untrustworthy" mobile user has attack behavior, then adopt corresponding countermeasures.
进一步,所述行为特征分类的方法包括:Further, the method for classifying behavioral characteristics includes:
把n个向量分为c个模糊类,通过计算每个类的聚类中心和隶属矩阵,求解使得聚类目标函数J最小的模糊划分矩阵以及聚类中心;Divide n vectors into c fuzzy classes, calculate the cluster center and membership matrix of each class, and solve the fuzzy partition matrix and cluster center that make the clustering objective function J the smallest;
xi为移动用户ui经过加权后的行为特征值,cj为第j个聚类中心,与xi具有同样的维度,vij为移动用户ui对分类j的隶属度,V=[vij]为隶属矩阵,目标函数J定义为各类数据到相应聚类中心距离的加权平均和;x i is the weighted behavior feature value of mobile user u i , c j is the jth cluster center, which has the same dimension as x i , v ij is the membership degree of mobile user u i to category j, V=[ v ij ] is the membership matrix, and the objective function J is defined as the weighted average sum of the distances from various types of data to the corresponding cluster centers;
通过迭代计算隶属度和聚类中心,实现目标函数最小化,隶属度和聚类中心的计算方法分别如式所示:By iteratively calculating the degree of membership and clustering center, the objective function is minimized. The calculation methods of degree of membership and clustering center are shown in the formulas respectively:
其中,dij为第i个数据到第j个数据中心cj的距离dij=||xi-cj||;设置一个阀值ε(0<ε<1),当|V(k+1)-V(k)|<ε时停止迭代。Among them, d ij is the distance from the i-th data to the j-th data center c j d ij =||x i -c j ||; set a threshold ε(0<ε<1), when |V (k +1) Stop iteration when -V (k) |<ε.
进一步,所述行为特征分类的方法具体包括:Further, the method for classifying behavioral characteristics specifically includes:
(a)初始化隶属度矩阵V;(a) Initialize the membership matrix V;
(b)以第k次的隶属度矩阵V(k)计算第k次的分类中心ck;(b) Calculate the k-th classification center c k with the k-th degree of membership matrix V (k) ;
(c)利用第k次的隶属度矩阵V(k)更新第k+1次的隶属度矩阵V(k+1);(c) Utilize the degree of membership matrix V (k) of the kth time to update the degree of membership matrix V (k+1) of the k+1 time;
(d)根据阀值ε(0<ε<1)判断是否满足迭代条件,如果|V(k+1)-V(k)|<ε,终止迭代,否则重复步骤(b)、(c)、(d)进行迭代。(d) Judge whether the iteration condition is met according to the threshold ε (0<ε<1), if |V (k+1) -V (k) |<ε, terminate the iteration, otherwise repeat steps (b) and (c) , (d) to iterate.
进一步,所述深度挖掘算法包括:Further, the depth mining algorithm includes:
(a)初始化:特定或不可信移动用户集U,具有攻击行为的用户集U'=φ,阀值ε=0,移动用户ui最新的行为属性的特征值为xi,移动用户ui最新具有攻击行为属性的特征值 (a) Initialization: specific or untrustworthy mobile user set U, user set U' = φ with attack behavior, threshold ε = 0, the characteristic value of the latest behavior attribute of mobile user u i is x i , mobile user u i The latest characteristic value with the attribute of aggressive behavior
(b)对移动用户ui的特征值xi进行行为统计与分析,得到移动用户ui最新具有攻击行为属性的特征值 (b) Conduct behavior statistics and analysis on the characteristic value x i of mobile user u i , and obtain the latest characteristic value of mobile user u i with attack behavior attribute
(c)计算xi到的欧氏距离和移动用户ui的攻击行为因子并进行归一化处理;(c) Calculate x i to The Euclidean distance of and the attack behavior factor of mobile user u i And perform normalization processing;
(d)依据ζi判断移动用户ui的攻击行为指数,通过与阀值ε进行大小比较,给出移动用户ui是否具有攻击行为的判断。(d) Judging the attack behavior index of mobile user u i according to ζ i , and comparing it with the threshold ε, giving the judgment of whether mobile user u i has aggressive behavior.
本发明的另一目的在于提供一种利用所述基于行为评判的隐蔽式网络攻击主动发现方法的移动互联网。Another object of the present invention is to provide a mobile Internet utilizing the method for actively discovering covert network attacks based on behavior evaluation.
本发明提供的基于行为评判的隐蔽式网络攻击主动发现方法,引入模糊聚类、挖掘算法、相似度比较等算法与理论,设计出移动互联网环境下隐蔽式网络攻击主动发现机制与方法,建立移动互联网环境下基于行为评判的隐蔽式网络攻击主动发现模型,解决移动互联网环境下安全应用的低可控性与安全需求之间的矛盾;本发明提前阻止可能发生的隐蔽式网络攻击,为构建安全可信的移动互联网应用环境奠定理论基础,对于及时发现安全威胁、保护个人隐私和财产安全、维护公共网络安全、构建安全可信的移动互联网应用环境、促进移动互联网安全研究发展既具有十分重要意义,又有实用价值。由于大多数隐蔽式网络攻击都是将自身网络通信伪装或隐蔽于合法的正常网络数据流中,以躲避安全检测;而本发明的隐蔽式网络攻击主动发现模型是在前面研究基于云模型理论的移动用户行为管理数学模型和基于云模型推理的移动用户行为可信评判模型的基础上,利用本发明基于模糊C均值聚类的行为特征分类算法和基于模糊聚类的网络攻击行为深度挖据算法,从隐藏于移动用户的复杂行为中挖掘出是否具有攻击行为(隐蔽式攻击行为),具有主动性。行为特征分类方法采用基于模糊C均值聚类的行为特征分类算法,通过迭代计算隶属度和聚类中心,实现目标函数最小化,记录移动用户的最新行为特征。所述深度挖掘算法是在行为特征分类的基础上对特定(不可信)移动用户相似度比较等理论,找出具有攻击行为的移动用户。The method for actively discovering hidden network attacks based on behavior evaluation provided by the present invention introduces algorithms and theories such as fuzzy clustering, mining algorithms, and similarity comparison, and designs a mechanism and method for actively discovering hidden network attacks in the mobile Internet environment. The concealed network attack active discovery model based on behavior evaluation in the Internet environment solves the contradiction between the low controllability and security requirements of security applications in the mobile Internet environment; A credible mobile Internet application environment lays a theoretical foundation, which is of great significance for timely discovery of security threats, protection of personal privacy and property security, maintenance of public network security, construction of a safe and credible mobile Internet application environment, and promotion of mobile Internet security research and development. , and has practical value. Since most covert network attacks disguise or hide their own network communication in legal normal network data flows to avoid security detection; and the active discovery model of covert network attacks in the present invention is based on the cloud model theory in the previous study On the basis of the mathematical model of mobile user behavior management and the trusted evaluation model of mobile user behavior based on cloud model reasoning, the present invention uses the behavior feature classification algorithm based on fuzzy C-means clustering and the network attack behavior deep data mining algorithm based on fuzzy clustering , dig out whether there is an attack behavior (covert attack behavior) from the complex behavior hidden in the mobile user, and has the initiative. The behavior feature classification method adopts the behavior feature classification algorithm based on fuzzy C-means clustering, through iterative calculation of membership degree and cluster center, the objective function is minimized, and the latest behavior features of mobile users are recorded. The deep mining algorithm is based on the classification of behavioral characteristics to compare specific (untrustworthy) mobile users' similarity and other theories to find out mobile users with aggressive behavior.
附图说明Description of drawings
图1是本发明实施例提供的基于行为评判的隐蔽式网络攻击主动发现方法流程图。Fig. 1 is a flow chart of a method for actively discovering covert network attacks based on behavior evaluation provided by an embodiment of the present invention.
图2是本发明实施例提供的基于行为评判的隐蔽式网络攻击主动发现方法具体实现流程图。Fig. 2 is a specific implementation flow chart of the method for actively discovering covert network attacks based on behavior evaluation provided by an embodiment of the present invention.
具体实施方式detailed description
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
下面结合附图对本发明的应用原理作详细的描述。The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.
如图1所示,本发明实施例提供的基于行为评判的隐蔽式网络攻击主动发现方法包括以下步骤:As shown in Figure 1, the method for actively discovering concealed network attacks based on behavior judgment provided by the embodiment of the present invention includes the following steps:
S101:采用模糊聚类算法对通过“移动用户行为可信评判”结果“不可信”的移动用户依据其行为特征进行分类;S101: Using a fuzzy clustering algorithm to classify mobile users who have passed the "credible evaluation of mobile user behavior" results "not credible" according to their behavioral characteristics;
S102:从被判断为“不可信”的移动用户中挖掘发现攻击者;针对各移动用户行为特征定义为相应的攻击行为因子,建立移动用户相应的攻击行为度量指标,并引入基于模糊聚类的挖掘算法,采用基于模糊聚类的隐蔽式网络攻击行为深度挖掘算法;S102: Mining and discovering attackers from mobile users judged as "untrustworthy"; defining the behavior characteristics of each mobile user as corresponding attack behavior factors, establishing corresponding attack behavior metrics for mobile users, and introducing fuzzy clustering-based The mining algorithm adopts the deep mining algorithm of hidden network attack behavior based on fuzzy clustering;
S103:计算“不可信”移动用户的攻击行为因子,判定“不可信”移动用户是否存在某种攻击;如果该“不可信”移动用户有攻击行为,则采取相应的应对策略。S103: Calculate the attack behavior factor of the "untrustworthy" mobile user, and determine whether the "untrustworthy" mobile user has some kind of attack; if the "untrustworthy" mobile user has attack behavior, adopt a corresponding countermeasure.
下面结合附图对本发明的应用原理作进一步的描述。The application principle of the present invention will be further described below in conjunction with the accompanying drawings.
本发明的基于行为评判的隐蔽式网络攻击主动发现的基本思路(如图2所示):首先采用模糊聚类算法(本发明拟采用模糊C均值聚类算法,研究移动互联网环境下基于模糊C均值聚类的行为特征分类算法)对通过“移动用户行为可信评判”结果“不可信”的移动用户依据其行为特征进行分类(为了快速、高效地挖掘发现移动互联网环境下的隐蔽式攻击,在本发明中,拟首先从被判断为“不可信”的移动用户中挖掘发现攻击者(这是因为评判结果为“可信”的移动用户一般都是“遵纪守法”用户);当然,在实际应用中,可以根据实际情况对评判结果为“可信”的移动用户进一步挖掘发现是否具有隐蔽式攻击行为,杜绝“可信就是安全”情况的发生,防止遗漏掉真正的攻击者。),划分为粒度更小的移动用户行为特征;然后针对各移动用户行为特征定义为相应的攻击行为因子,建立移动用户相应的攻击行为度量指标,并引入基于模糊聚类的挖掘算法,研究并提出基于模糊聚类的隐蔽式网络攻击行为深度挖掘算法;最后计算“不可信”移动用户的攻击行为因子,判定“不可信”移动用户是否存在某种攻击;如果该“不可信”移动用户有攻击行为,则采取相应的应对策略。(由于大多数隐蔽式网络攻击都是将自身网络通信伪装或隐蔽于合法的正常网络数据流中,以躲避安全检测;而本发明的隐蔽式网络攻击主动发现模型是在前面研究基于云模型理论的移动用户行为管理数学模型和基于云模型推理的移动用户行为可信评判模型的基础上,利用本发明的基于模糊C均值聚类的行为特征分类算法和基于模糊聚类的网络攻击行为深度挖据算法,从隐藏于移动用户的复杂行为中挖掘出是否具有攻击行为(隐蔽式攻击行为),具有主动性,因此本发明将其称之为基于行为评判的隐蔽式网络攻击主动发现模型。)The basic idea of the present invention's active discovery of covert network attacks based on behavior evaluation (as shown in Figure 2): firstly adopt fuzzy clustering algorithm (the present invention intends to adopt fuzzy C-means clustering algorithm, research mobile Internet environment based on fuzzy C Behavioral feature classification algorithm based on mean value clustering) to classify mobile users who pass the "credible evaluation of mobile user behavior" results "untrustworthy" according to their behavioral features (in order to quickly and efficiently discover hidden attacks in the mobile Internet environment, In the present invention, at first intend to mine and discover the assailant from being judged as " unreliable " mobile user (this is because the mobile user of " credible " generally is " law-abiding " user); Certainly, In practical applications, mobile users whose evaluation results are "credible" can be further mined to find out whether they have covert attack behaviors according to the actual situation, so as to prevent the occurrence of "trustworthy is safe" and prevent the real attacker from being missed.) , divided into mobile user behavior characteristics with smaller granularity; then, each mobile user behavior characteristic is defined as the corresponding attack behavior factor, and the corresponding attack behavior measurement index of mobile users is established, and a mining algorithm based on fuzzy clustering is introduced to study and propose A deep mining algorithm for covert network attack behavior based on fuzzy clustering; finally, calculate the attack behavior factor of the "untrustworthy" mobile user to determine whether there is any kind of attack on the "untrustworthy" mobile user; if the "untrustworthy" mobile user has an attack behavior, adopt corresponding coping strategies. (Because most of the covert network attacks are all to camouflage or conceal their network communication in the legal normal network data flow, to avoid security detection; and the covert network attack active discovery model of the present invention is based on the cloud model theory in the previous research Based on the mathematical model of mobile user behavior management and the credible evaluation model of mobile user behavior based on cloud model reasoning, the behavior feature classification algorithm based on fuzzy C-means clustering and the deep mining of network attack behavior based on fuzzy clustering of the present invention are used. According to the algorithm, dig out whether there is an attack behavior (concealed attack behavior) from the complex behavior hidden in the mobile user, and has initiative, so the present invention calls it a concealed network attack active discovery model based on behavior evaluation.)
本发明基于模糊C均值聚类的行为特征分类算法和基于模糊聚类的隐蔽式网络攻击行为深度挖掘算法。The invention provides a behavior characteristic classification algorithm based on fuzzy C-means clustering and a hidden network attack behavior depth mining algorithm based on fuzzy clustering.
定义1.xi为第i个移动用户ui(i=1,2,...,n)行为属性的特征值(i=1,2,...,n),tj为权重系数其中xij(j=1,2,...,m)为用户ui关于第j个行为属性的特征值。Definition 1. x i is the characteristic value of the i-th mobile user u i (i=1, 2,...,n) behavior attribute (i=1,2,...,n), t j is the weight coefficient Where x ij (j=1,2,...,m) is the feature value of user u i about the jth behavior attribute.
定义2.移动用户ui(i=1,2,...,n)的攻击行为因子是移动用户ui的基于欧氏距离的攻击行为度量标准,其中为移动用户ui具有攻击行为属性的特征值。Definition 2. Attack behavior factor of mobile user u i (i=1, 2, ..., n) is the attack behavior metric based on the Euclidean distance of the mobile user u i , where is the characteristic value of the mobile user u i having the attack behavior attribute.
①基于模糊C均值聚类的行为特征分类算法① Behavioral feature classification algorithm based on fuzzy C-means clustering
模糊C均值聚类(Fuzzy C-Means Clustering,FCM)把n个向量分为c个模糊类,通过计算每个类的聚类中心和隶属矩阵,求解使得聚类目标函数J(目标函数见公式(1))最小的模糊划分矩阵以及聚类中心。Fuzzy C-Means Clustering (Fuzzy C-Means Clustering, FCM) divides n vectors into c fuzzy classes, and calculates the cluster center and membership matrix of each class to solve the clustering objective function J (see the formula for the objective function (1)) The smallest fuzzy partition matrix and cluster center.
在公式(2)中,xi为移动用户ui经过加权后的行为特征值,cj为第j个聚类中心(与xi具有同样的维度),vij为移动用户ui对分类j的隶属度,V=[vij]为隶属矩阵,目标函数J可以定义为各类数据到相应聚类中心距离的加权平均和(本发明的研究采用欧氏距离计算数据到聚类中心的距离)。In formula (2), x i is the weighted behavior feature value of mobile user u i , c j is the jth cluster center (with the same dimension as x i ), v ij is the classification of mobile user u i The degree of membership of j, V=[v ij ] is the membership matrix, and the objective function J can be defined as the weighted average sum of the distances from various data to the corresponding cluster center (research of the present invention uses Euclidean distance to calculate the distance from the data to the cluster center distance).
基于模糊C均值聚类的行为特征分类算法通过迭代计算隶属度和聚类中心,实现目标函数最小化。隶属度和聚类中心的计算方法分别如公式(2)和公式(3)所示:The behavior feature classification algorithm based on fuzzy C-means clustering achieves the minimization of the objective function by iteratively calculating the degree of membership and the cluster center. The calculation methods of membership degree and cluster center are shown in formula (2) and formula (3) respectively:
其中,dij为第i个数据到第j个数据中心cj的距离dij=||xi-cj||。在基于模糊C均值聚类的行为特征分类算法中设置一个阀值ε(0<ε<1),当|V(k+1)-V(k)|<ε时停止迭代;在m接近于1时,算法接近C均值算法(m的选值均需来自大量实验和实际经验)。Wherein, d ij is the distance from the i-th data to the j-th data center c j d ij =|| xi -c j ||. Set a threshold ε (0<ε<1) in the behavioral feature classification algorithm based on fuzzy C-means clustering, and stop iteration when |V (k+1) -V (k) |<ε; when m is close to When 1, the algorithm is close to the C-means algorithm (the selection of m needs to come from a large number of experiments and practical experience).
基于模糊C均值聚类的行为特征分类算法流程如下:The flow of behavior feature classification algorithm based on fuzzy C-means clustering is as follows:
(a)初始化隶属度矩阵V;(a) Initialize the membership matrix V;
(b)以第k次的隶属度矩阵V(k)计算第k次的分类中心ck;(b) Calculate the k-th classification center c k with the k-th degree of membership matrix V (k) ;
(c)利用第k次的隶属度矩阵V(k)更新第k+1次的隶属度矩阵V(k+1);(c) Utilize the degree of membership matrix V (k) of the kth time to update the degree of membership matrix V (k+1) of the k+1 time;
(d)根据阀值ε(0<ε<1)判断是否满足迭代条件,如果|V(k+1)-V(k)|<ε,终止迭代,否则重复步骤(b)、(c)、(d)进行迭代。(d) Judge whether the iteration condition is met according to the threshold ε (0<ε<1), if |V (k+1) -V (k) |<ε, terminate the iteration, otherwise repeat steps (b) and (c) , (d) to iterate.
②基于模糊聚类的隐蔽式网络攻击行为深度挖掘算法②Deep mining algorithm for concealed network attack behavior based on fuzzy clustering
为利用基于模糊C均值聚类的分类算法实现对移动用户攻击行为的度量,首先对移动用户的行为分布规律进行统计与分析,同时记录移动用户的最新行为特征;在此基础上,提出基于模糊聚类的隐蔽式网络攻击行为深度挖掘算法,具体流程如下:In order to use the classification algorithm based on fuzzy C-means clustering to measure the attack behavior of mobile users, firstly, statistics and analysis are made on the behavior distribution of mobile users, and the latest behavior characteristics of mobile users are recorded at the same time; on this basis, a method based on fuzzy Clustering hidden network attack behavior depth mining algorithm, the specific process is as follows:
(a)初始化:特定(不可信)移动用户集U,具有攻击行为的用户集U'=φ,阀值ε=0,移动用户ui最新的行为属性的特征值为xi,移动用户ui最新具有攻击行为属性的特征值 (a) Initialization: specific (untrustworthy) mobile user set U, user set U'=φ with aggressive behavior, threshold ε=0, the characteristic value of the latest behavior attribute of mobile user u i is x i , mobile user u i latest feature value with attack behavior attribute
(b)对移动用户ui的特征值xi进行行为统计与分析,得到移动用户ui最新具有攻击行为属性的特征值 (b) Conduct behavior statistics and analysis on the characteristic value x i of mobile user u i , and obtain the latest characteristic value of mobile user u i with attack behavior attribute
(c)计算xi到的欧氏距离和移动用户ui的攻击行为因子并进行归一化处理;(c) Calculate x i to The Euclidean distance of and the attack behavior factor of mobile user u i And perform normalization processing;
(d)依据ζi判断移动用户ui的攻击行为指数,通过与阀值ε进行大小比较,给出移动用户ui是否具有攻击行为的判断。(d) Judging the attack behavior index of mobile user u i according to ζ i , and comparing it with the threshold ε, giving the judgment of whether mobile user u i has aggressive behavior.
引入模糊聚类、挖掘算法、相似度比较等理论,设计出移动互联网环境下基于行为评判的隐蔽式网络攻击主动发现机制与方法,解决移动互联网环境下安全应用的低可控性与安全需求之间的矛盾,低可控性是指在当前网络环境下,由于黑客的攻击,用户有时都无法控制自己的资源;在网络时代,用户有“能控制自己资源的安全需求”,及时发现攻击可以有效地解决这种低可控性和安全需求之间的矛盾。提前阻止可能发生的隐蔽式网络攻击。Introduce fuzzy clustering, mining algorithms, similarity comparison and other theories, and design a mechanism and method for the active discovery of hidden network attacks based on behavioral evaluation in the mobile Internet environment, to solve the problem of low controllability and security requirements of security applications in the mobile Internet environment. Low controllability means that in the current network environment, due to hacker attacks, users sometimes cannot control their own resources; Effectively solve the contradiction between this low controllability and safety requirements. Prevent possible covert cyber attacks in advance.
下面结合实验对本发明的应用效果作详细的描述。The application effects of the present invention will be described in detail below in conjunction with experiments.
为了验证本发明的基于行为评判的隐蔽式网络攻击主动发现模型的有效性、可行性和安全性,模拟移动互联网环境下实际应用场景,进行网络攻击发现的实验验证。比如设计移动办公环境下预先设定好若干隐蔽式网络攻击,将本发明的隐蔽式网络攻击主动发现模型模拟应用于移动办公网络,验证能否发现预先设定好的隐蔽式网络攻击,以验证本发明的模型的可行性和有效性;通过模拟设计移动办公环境下移动用户篡改实验,分析说明本发明的模型是如何防止移动用户可控性问题,以及如何解决移动办公网络环境下安全应用的低可控性与安全需求之间矛盾的问题,同时根据实验结果数据的分析,修正并完善本发明研究的基于行为评判的隐蔽式网络攻击主动发现模型。In order to verify the effectiveness, feasibility and security of the behavioral evaluation-based concealed network attack active discovery model of the present invention, the actual application scene in the mobile Internet environment is simulated to conduct experimental verification of network attack discovery. For example, a number of hidden network attacks are pre-set in the mobile office environment, and the hidden network attack active discovery model of the present invention is simulated and applied to the mobile office network to verify whether the preset hidden network attacks can be found, so as to verify Feasibility and effectiveness of the model of the present invention; by simulating and designing a mobile user tampering experiment in a mobile office environment, analysis and description of how the model of the present invention prevents the controllability problem of mobile users, and how to solve the security application under the mobile office network environment In order to solve the problem of contradiction between low controllability and security requirements, at the same time, according to the analysis of experimental result data, the active discovery model of concealed network attacks based on behavior evaluation is revised and perfected in the present invention.
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Any modifications, equivalent replacements and improvements made within the spirit and principles of the present invention should be included in the protection of the present invention. within range.
Claims (5)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710021802.4A CN106506567A (en) | 2017-01-12 | 2017-01-12 | A proactive discovery method for covert network attacks based on behavior evaluation |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710021802.4A CN106506567A (en) | 2017-01-12 | 2017-01-12 | A proactive discovery method for covert network attacks based on behavior evaluation |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN106506567A true CN106506567A (en) | 2017-03-15 |
Family
ID=58345228
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201710021802.4A Pending CN106506567A (en) | 2017-01-12 | 2017-01-12 | A proactive discovery method for covert network attacks based on behavior evaluation |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106506567A (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110266728A (en) * | 2019-07-17 | 2019-09-20 | 杨鲲 | Prevention-Security and method for detecting abnormality, apparatus and system based on MQTT message queue |
| CN110855650A (en) * | 2019-11-05 | 2020-02-28 | 西安交通大学 | A kind of illegal file upload detection method |
| CN114039867A (en) * | 2021-11-08 | 2022-02-11 | 江南大学 | A Joint Interval Estimation Method for Networked Control System State and Fault Under Covert Attack |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101075917A (en) * | 2007-07-16 | 2007-11-21 | 华为技术有限公司 | Method and apparatus for predicting network attack behaviour |
| CN102045358A (en) * | 2010-12-29 | 2011-05-04 | 深圳市永达电子股份有限公司 | Intrusion detection method based on integral correlation analysis and hierarchical clustering |
| CN105208040A (en) * | 2015-10-12 | 2015-12-30 | 北京神州绿盟信息安全科技股份有限公司 | Network attack detection method and device |
-
2017
- 2017-01-12 CN CN201710021802.4A patent/CN106506567A/en active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101075917A (en) * | 2007-07-16 | 2007-11-21 | 华为技术有限公司 | Method and apparatus for predicting network attack behaviour |
| CN102045358A (en) * | 2010-12-29 | 2011-05-04 | 深圳市永达电子股份有限公司 | Intrusion detection method based on integral correlation analysis and hierarchical clustering |
| CN105208040A (en) * | 2015-10-12 | 2015-12-30 | 北京神州绿盟信息安全科技股份有限公司 | Network attack detection method and device |
Non-Patent Citations (1)
| Title |
|---|
| 庞淑敬: "基于模糊聚类分析的入侵检测技术研究", 《信息科技辑》 * |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110266728A (en) * | 2019-07-17 | 2019-09-20 | 杨鲲 | Prevention-Security and method for detecting abnormality, apparatus and system based on MQTT message queue |
| CN110266728B (en) * | 2019-07-17 | 2022-03-08 | 杨鲲 | MQTT message queue-based security defense and anomaly detection method, device and system |
| CN110855650A (en) * | 2019-11-05 | 2020-02-28 | 西安交通大学 | A kind of illegal file upload detection method |
| CN110855650B (en) * | 2019-11-05 | 2021-05-07 | 西安交通大学 | Illegal file uploading detection method |
| CN114039867A (en) * | 2021-11-08 | 2022-02-11 | 江南大学 | A Joint Interval Estimation Method for Networked Control System State and Fault Under Covert Attack |
| CN114039867B (en) * | 2021-11-08 | 2022-09-06 | 江南大学 | Joint interval estimation method for state and fault of networked control system under hidden attack |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Miehling et al. | A POMDP approach to the dynamic defense of large-scale cyber networks | |
| Liu et al. | An intrusion detection method for internet of things based on suppressed fuzzy clustering | |
| Iqbal et al. | A feed-forward and pattern recognition ANN model for network intrusion detection | |
| CN102724199B (en) | Based on the intention recognition method of Bayesian Network Inference | |
| Li | An immunity based network security risk estimation | |
| Om Kumar et al. | Intrusion detection model for IoT using recurrent kernel convolutional neural network | |
| Sbai et al. | Data flooding intrusion detection system for manets using deep learning approach | |
| CN113992375A (en) | Heterogeneous complex network defense method based on genetic algorithm | |
| CN103916385A (en) | WAF safety monitoring system based on intelligent algorithm | |
| Laptiev et al. | Dynamic model of cyber defense diagnostics of information systems with the use of fuzzy technologies | |
| CN115037553B (en) | Information security monitoring model construction method and device, information security monitoring model application method and device, and storage medium | |
| Chen et al. | Multi-level adaptive coupled method for industrial control networks safety based on machine learning | |
| CN117579324A (en) | Intrusion detection method based on gated temporal convolutional network and graph | |
| CN106506567A (en) | A proactive discovery method for covert network attacks based on behavior evaluation | |
| Ghosh et al. | An efficient SGM based IDS in cloud environment | |
| Udayakumar et al. | Anomaly detection for internet of things security attacks based on recent optimal federated deep learning model | |
| Samuel | Cyber situation awareness perception model for computer network | |
| Zhao et al. | A situation awareness approach for network security using the fusion model | |
| Zhang et al. | A Step-Based Deep Learning Approach for Network Intrusion Detection. | |
| Ovi et al. | Confident federated learning to tackle label flipped data poisoning attacks | |
| Chen et al. | An investigation of recent backdoor attacks and defenses in federated learning | |
| Xiao et al. | FedRMA: A robust federated learning resistant to multiple poisoning attacks | |
| Daund et al. | Intrusion detection in wireless sensor networks using hybrid deep belief networks and harris hawks optimizer | |
| Zhang et al. | An intrusion detection scheme based on repeated game in smart home | |
| Albusalih et al. | Xss detection using hybrid machine learning methods |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170315 |
|
| RJ01 | Rejection of invention patent application after publication |