信息网络安全 ›› 2015, Vol. 15 ›› Issue (9): 15-19.doi: 10.3969/j.issn.1671-1122.2015.09.004

• 优秀论文 • 上一篇    下一篇

现代网络安全架构异常行为分析模型研究

尚进(), 谢军, 蒋东毅, 陈怀临   

  1. 北京山石网科信息技术有限公司,北京100084
  • 收稿日期:2015-07-15 出版日期:2015-09-01 发布日期:2015-11-13
  • 作者简介:

    作者简介: 尚进(1972-),男,辽宁,高级工程师,博士,主要研究方向:网络安全;谢军(1975- ),男,江西,高级工程师,硕士,主要研究方向:网络安全;蒋东毅(1965-),男,辽宁,高级工程师,硕士,主要研究方向:网络安全;陈怀临(1970-),男,江西,高级工程师,博士,主要研究方向:网络安全。

Research on Abnormal Behavior Analysis of Modern Networking Security Architecture

Jin SHANG(), Jun XIE, Dong-yi JIANG, Huai-lin CHEN   

  1. Beijing Hillstone Networks Co., Ltd., Beijing 100084, China
  • Received:2015-07-15 Online:2015-09-01 Published:2015-11-13

摘要:

近年来国内外发生多起大规模网络攻击和泄露事件,同时零日攻击、高级持续威胁(APT)等攻击方式的出现和日益普遍,促使基于全面多阶段的网络杀伤链的网络安全防护架构产生并迅速被众多厂商采用和推广,该架构中对主机网络异常行为的分析成为对恶意软件的大量变种入侵后及时检测的关键技术。以往的异常行为分析模型算法单一,缺乏对间接维度、时序关联的考虑。文章提出一种自适应网络异常的数据分析模型,可分析具有单一特性和分布特性的网络维度,并考虑了时间和时域多周期对网络维度的影响。应用该模型的产品易于管理,异常和攻击行为识别准确,可较好地提升网络杀伤链的分析准确性。

关键词: 网络杀伤链, 数据分析, 异常行为分析, 网络维度, 恶意软件

Abstract:

Recently, due to the occurrence of a series of large scale of attack and data leaking affections, and the common of zero-day and APT attacks, the networking security architecture using cyber kill chain based on multi-stages emerges and is widely used in industry. The network abnormal behavior analysis is the key technology to detect the mass variants of malwares that intrude in the architecture. Most of existing abnormal behavior analysis models uses the simple algorithm without considering temporal association, indirect dimension, etc. This paper proposes an adaptive networking abnormal analysis model which applies into single and distribution dimensions, and considers time and periodic affections. This model has better usability and more accurate abnormal detection results, and can help a lot on overall analysis results by using cyber kill chain.

Key words: cyber kill chain, data analysis, abnormal behavior analysis, malware

中图分类号: