首页 | 本学科首页   官方微博 | 高级检索  
     

分布式异构网络恶意攻击取证及预警方法研究
引用本文:高菲.分布式异构网络恶意攻击取证及预警方法研究[J].计算技术与自动化,2021,40(1):184-188.
作者姓名:高菲
作者单位:国网冀北电力有限公司技能培训中心(保定电力职业技术学院) ,河北 保定 071000
摘    要:传统的网络恶意攻击取证方法对恶意攻击行为的检查不全面、恶意攻击行为相似度分辨准确性低。为此,提出了一种分布式异构网络恶意攻击取证及预警方法。利用CVSS计算器对网络恶意攻击行为的严重等级进行评估,结合灰关联分析法建立灰关联模型,对评估要素进行量化处理;在此基础上,获取并处理日志、事件、警告和证据信息,建立证据库。根据取证结果,结合TOP-K预警策略实现分布式异构网络恶意攻击的预警和预警信息储存。实验结果表明,所提方法对恶意攻击行为的查全率和恶意攻击行为相似度分辨的准确性较高,且预警反应耗时较短,不仅能够准确检测恶意攻击行为,还能够及时发出警报,有效维持分布式异构网络的安全性。

关 键 词:分布式异构网络  网络恶意攻击  差异信息  灰关联模型

Research on Forensics and Forewarning Methods of Distributed Heterogeneous Network Malicious Attacks
GAO Fei.Research on Forensics and Forewarning Methods of Distributed Heterogeneous Network Malicious Attacks[J].Computing Technology and Automation,2021,40(1):184-188.
Authors:GAO Fei
Affiliation:(Skills Training Center,State Grid Jibei Electric Power Company Limited(Baoding Electric Power Voc.&Tech.College),Baoding,Hebei 071051,China)
Abstract:The traditional network malicious attack forensics method for malicious attack behavior inspection is not comprehensive, malicious attack behavior similarity discrimination accuracy is low. Therefore, this study proposes a distributed heterogeneous network malicious attack forensics and warning method. CVSS calculator was used to evaluate the severity of malicious network attacks, and gray correlation analysis method was used to establish a gray correlation model to quantify the evaluation factors. On this basis, obtain and process log, event, warning and evidence information, establish evidence base. According to the forensics results, TOP-K warning strategy is combined to realize the warning and warning information storage of distributed heterogeneous network malicious attack. The experimental results show that the proposed method is more accurate in detecting the malicious attack and distinguishing the similarity degree of the malicious attack, and the early-warning response time is shorter. It can not only accurately detect the malicious attack, but also send out the alarm in time, effectively maintaining the security of distributed heterogeneous network.
Keywords:distributed heterogeneous network  malicious network attacks  difference information  grey relational model
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算技术与自动化》浏览原始摘要信息
点击此处可从《计算技术与自动化》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号