首页 | 本学科首页   官方微博 | 高级检索  
     

大数据环境下威胁的协作式检测综述
引用本文:张俭鸽,郭渊博,马骏,陈越. 大数据环境下威胁的协作式检测综述[J]. 计算机科学, 2016, 43(10): 19-26
作者姓名:张俭鸽  郭渊博  马骏  陈越
作者单位:信息工程大学数学工程与先进计算国家重点实验室 郑州450001,信息工程大学数学工程与先进计算国家重点实验室 郑州450001,信息工程大学数学工程与先进计算国家重点实验室 郑州450001,信息工程大学数学工程与先进计算国家重点实验室 郑州450001
基金项目:本文受国家自然科学基金项目(61201220,61309018),国家973计划项目(2012CB315901),十二五预研项目资助
摘    要:恶意的不法分子采用直接或间接的方法攻击个人、机构、国家,从而使其遭受不同程度的威胁。此类信息的形式多种多样,数据量巨大,而且需要被高速地处理。因此,首先对5种典型的协作式检测模型Esper,Hadoop,Agilis,Storm和Spark进行分析、比较,阐述不同模型所适用的网络环境;然后对网络环境中常用的攻击手段DDoS,MITM,APT进行分析,说明检测这些攻击适合采用的模型;最后给出威胁的协作式检测架构模型部署方案,该方案包括发送和接收处理两个组件,并指出可根据实际需要进行不同模型的架构部署;特别地,给出了对等 网络、分等级的安全域网络、分层结构网络中架构模型的部署方案。

关 键 词:威胁  协作式检测  攻击  架构模型  大数据
收稿时间:2015-09-16
修稿时间:2015-12-07

Review of Collaborative Detection of Threat in Big Data
ZHANG Jian-ge,GUO Yuan-bo,MA Jun and CHEN Yue. Review of Collaborative Detection of Threat in Big Data[J]. Computer Science, 2016, 43(10): 19-26
Authors:ZHANG Jian-ge  GUO Yuan-bo  MA Jun  CHEN Yue
Affiliation:State Key Laboratory of Mathematical Engineering and Advanced Computing,The PLA Information Engineering University,Zhengzhou 450001,China,State Key Laboratory of Mathematical Engineering and Advanced Computing,The PLA Information Engineering University,Zhengzhou 450001,China,State Key Laboratory of Mathematical Engineering and Advanced Computing,The PLA Information Engineering University,Zhengzhou 450001,China and State Key Laboratory of Mathematical Engineering and Advanced Computing,The PLA Information Engineering University,Zhengzhou 450001,China
Abstract:Some malicious and illegal persons take advantage of direct or indirect methods to attack some person,organization and nation,so that they suffer from different degrees of threats.The type of information is various,volume of data is large and it needs to be processed at high speed.Therefore,we firstly analyzed five typical collaborative detection models which are Esper model,Hadoop model,Agilis model,Storm model and Spark model.Moreover,we made comparison of them and expatiated the network environment for different models.Then,we analyzed common attack methodsin the network which are DDoS attack,MITM attack and APT attack,and explained detection models for these attacks.Finally,we provided the deployment scheme of collaborative detection of architecture model for threats.The scheme includes two components which are sending component and receiving processing component.Then we pointed out that the architecture of different models can be deployed according to practical requirements.Especially,we provided the deployment scheme of architecture model in peer to peer network,ranked security domain network,and hierarchical structure network.
Keywords:Threat  Collaborative detection  Attack  Architecture model  Big data
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号