CN109327480A - A kind of multi-step attack scene method for digging based on neural network and Bayesian network attack graph - Google Patents

A kind of multi-step attack scene method for digging based on neural network and Bayesian network attack graph Download PDF

Info

Publication number
CN109327480A
CN109327480A CN201811532387.XA CN201811532387A CN109327480A CN 109327480 A CN109327480 A CN 109327480A CN 201811532387 A CN201811532387 A CN 201811532387A CN 109327480 A CN109327480 A CN 109327480A
Authority
CN
China
Prior art keywords
attack
alarm
node
sequence
graph
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811532387.XA
Other languages
Chinese (zh)
Other versions
CN109327480B (en
Inventor
张茹
刘建毅
刘博文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201811532387.XA priority Critical patent/CN109327480B/en
Publication of CN109327480A publication Critical patent/CN109327480A/en
Application granted granted Critical
Publication of CN109327480B publication Critical patent/CN109327480B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention proposes a kind of new multi-step attack scene method for digging.This method is divided into mode and on-line mode two parts under line.Online under lower mode, user is trained rejecting fault alarm by neural network using known true attack alarm log, using a series of processing such as Alert aggregation processing and the generation of causalnexus attack sequence and then generation Bayesian network attack graph;On line under mode, user can use alarm log on a large amount of lines to the neural network that generates of front lower die formula and Bayesian network attack graph be updated iteration, to keep the attack graph after iteration more complete and accurate, finally, we extract a variety of multi-step attack scenes from Bayesian network attack graph.Using technical method of the invention, it can be eliminated by the wrong report to alarm log and find attack mode, building multi-step attack scene from the alarm log of bulk redundancy.

Description

It is a kind of to be excavated based on the multi-step attack scene of neural network and Bayesian network attack graph Method
Technical field
The present invention relates to the scene analysis fields of network log, and the invention proposes one kind to be based on neural network and Bayes The multi-step attack scene method for digging of network attack map.
Background technique
So far, the research for being directed to alarm association is broadly divided into four classes, the method based on causal logic, is based on scene Method, the method based on similitude and the warning association analysis based on data mining.
Method based on causal logic assumes that there are cause and effect passes between the continuous abnormal event of same threat behavior System, the latter anomalous event carry out under the premise of previous anomalous event is effective, and basic thought is to give various alarm types Generation need after the cause and generation that meet caused by consequence, by the cause and effect between matching alarm to alarm data Causalnexus is carried out, to rebuild Cyberthreat behavior.The advantages of such method is: 1. need to analyze threat behavior and individually walk Rapid cause and effect, without pre-defined entire threat behavior sequence;2. have certain unknown threat behavioral value ability, it can To identify the unknown threat behavior sequence of different alarm combination formation.Disadvantage is: 1. are only applicable between each step that there are bright Causal threat behavior is shown, and unknown threat ability of discovery is weaker;2. search space is larger when association, computing cost is big, System resource is more demanding;3. rule defines granularity and is difficult to control, granularity is meticulous to will lead to that detection rate of failing to report is higher, and granularity is excessively thick It is higher to will lead to rate of false alarm again.
The basic thought of method based on scene is that all known threat behaviors are abstracted into rule knowledge in advance, so Alarm data to be processed and defined rule are matched afterwards, Cyberthreat behavior scene rule is reappeared according to matching result and knows Know the condition that the process for describing threat behavior and each step need to meet.The advantages of such method is: 1. by more The scene description language of sample keeps the flexibility of system;2. system can be kept effective by constantly updating knowledge base;As a result It is easy to understand.Its disadvantage is fairly obvious: 1. are difficult to find new attack based on regular, are easy to be avoided;2. algorithm has one Determine complexity, it is inefficient.
Method based on similitude assumes there is certain similitude, base between the alarm of same threat behavior This thought is to be determined whether to carry out alarm association according to the similarity degree between alarm, by by the attribute information of alarm data (timestamp, alarm type, address information etc.) is uniformly abstracted into vector pattern, and defined function calculates the distance between vector, gathers Class vector is to complete alarm association.Its maximum feature is exactly to use quantitative calculation method to carry out alarm association, such method The advantages of be: 1. algorithms are simple, and computing cost is small;2. detect have higher similarity alarm data threat behavior (such as Worm attack) when effect it is preferable.But disadvantage is also fairly obvious: a large amount of artificial setting ginsengs are needed during 1. calculating similitudes Number;2. particular attack type can only be directed to, algorithm versatility is poor.
Method based on data mining assumes there is certain connection between the alarm that consolidated network threatens behavior, Basic thought is to find to be hidden in the incidence relation after data distribution using data mining algorithm, according to incidence relation information It rebuilds and threatens behavior sequence.Frequent episodes excavation is one of alarm association frequently-used data method for digging [8-10], and this method thinks Appear between the alarm data in shorter time interval that there are certain incidence relations.According to time window by alarm sequence Multiple subsequences are decomposed into, frequent-item then is carried out to these subsequences, the obtained alarm in frequent item set is believed that There are incidence relations.The advantages of such method, is under the premise of not needing priori knowledge, has the ability to obtain unknown alarm class Type incidence relation, to find new threat behavior sequence.Its shortcoming is that: 1. data mining algorithm complexities are higher, calculate Expense is big;2. being associated with obtained result accuracy to be difficult to judge, need that domain knowledge is combined further to analyze.
Summary of the invention
The present invention is based on the above problems, proposes a kind of multistep based on neural network and Bayesian network attack graph Attack Scenarios method for digging is trained rejecting fault alarm by neural network using known true attack alarm log, then It is handled by Alert aggregation and a series of processing such as causalnexus attack sequence generates generates Bayesian network attack graph in turn, together On a large amount of lines of Shi Liyong alarm log to front lower die formula generate neural network and Bayesian network attack graph be updated Iteration, to obtain more complete Attack Scenarios Result.
To achieve this purpose, the present invention adopts the following technical scheme:
1, the multi-step attack scene method for digging based on neural network and Bayesian network attack graph, which is characterized in that packet Include following steps:
It is respectively mode under on-line mode and line that this method, which is divided into both of which,.
A, mode under line: being the pretreatment operation that fault alarm and redundant alarm are removed to IDS alarm log first, Next treated IDS alarm log, the Bayesian network attack graph of building initialization alarm log are utilized;
B, on-line mode: utilizing a large amount of real-time logs information update iteration, improves attack graph model, improves Attack Scenarios and digs Dig efficiency;
C, the excavation of multi-step attack scene is carried out according to the Bayes's attack graph of generation, obtained all different in alarm log Multi-step attack sequence of scenes.
2, according to claim 1 to be excavated based on the multi-step attack scene of neural network and Bayesian network attack graph Method, which is characterized in that step A is further included steps of
A1, the related alarm quantity for extracting IDS alarm log, alarm density, periodically these three attributes are alerted;
A2, log is integrally divided into training set and verifying collection, constructs three layers of full connection mind using three attributes of training set Correctness through network output journal, and using verifying collection verifying Correctness of model, to eliminate fault alarm;
A3, for the alarm after screening, alarm event a is defined first, by a k tuple (at1,at2,at3,...,atk) It forms, wherein atiThe ith attribute of (1≤i≤k) expression alarm event.We press the timestamp (time of each alarm event Stamp it) sorts, according to setting time parameter T, with T hours for a batch, all alarms is divided into L batch.Each Batch is denoted as bi(1≤i≤L) divides time window by Δ t to all batch, traverses the institute in each bi (1≤i≤L) All alarm event a conversion in each time window is merged into member alarm ma by having time window, and ma meetsTo make to alert Quantity be further reduced;
A4, successively member alarm ma all in bi (1≤i≤L) is extracted, according to L alarm sequence of generation.Alarm sequence It is the set of one group of member alarm being sequentially arranged, is denoted as AS, AS={ ma1,ma2,ma3,…,man, and meet mai.timestamp≤maj.timestamp(1≤i≤j≤n);
A5, L alarm sequence AS is generated into m ASS from each alarm sequence according to following Causal Rule.
If A and B is two different member alarms.
{ 2. A [dstIPs]=B [srcIPs], A [dstPort]=B [srcPort] }
ASS is Attack Scenarios sequence in the step, i.e., attacker completes that IDS production may be triggered when a multi-step attack activity Raw alarm sequence, wherein ASS={ ma1,ma2,...,mak},mai(1≤i≤j≤k) indicates i-th yuan of alarm, and meets mai.timestamp<maj.timestamp(1≤i≤j≤k);
A6, to each Attack Scenarios relating sequence ASS, initialize Bayesian network attack graph, and according to suitable in ASS Sequence successively adds node of the point as attack graph in sequence.It determines the new point being added in BAG and is present in BAG interior joint Relationship, the value as node ε attribute.For each node, there is a CPT.It is shown in the state for giving its father node When the node probability value.After node is added to network every time, the CPT of each node is generated.Check alarm sequence AS In all elements whether be node in BAG, if the element is not present in BAG, the addition into BAG is until member in AS Element all occurs.It completes to construct by the above process, finally obtains the Bayesian network attack graph with 4 tuples (S, τ, ε, P) (BAG)。
3, according to claim 1 to be excavated based on the multi-step attack scene of neural network and Bayesian network attack graph Method, which is characterized in that step B is further included steps of
B1, it is that the on-line parameters of neural network are updated first, is directed to neural network, the hyper parameter of network is set, Such as: the learning rate learning_rate of network, size batch_size of network inputs etc..In batches by alarm log data with Batch_size is one group of feeding network, is updated using stochastic gradient descent method to parameter;
B2, followed by the on-line parameters of Bayesian network attack graph are updated, are directed to S, in new AS sequence if There is new element, then updates node representated by S in BAG.It is directed to τ, the multi-step attack sequence being directed in new ASS, more The newly corresponding attack path of BAG node of graph.Be directed to ε, update the binary group of the relationship between BAG interior joint and its father node < Sj,dj>.It is directed to P, the probability of each alarming node is updated each node and be directed to father's section by the impact probability of its father node The posterior probability of point, thus update the corresponding node probability distribution table (Conditional Probability Table, CPT)。
4, according to claim 1 to be excavated based on the multi-step attack scene of neural network and Bayesian network attack graph In scene method for digging, which is characterized in that step C is further included steps of
The root node and some leaf node of C1, fixed Bayesian network attack graph, if there are mulitpath between two o'clock, A multi-step attack sequence S then is found along a wherein paths, which is put into set Q.
If between C2, previous step root node and leaf node, there are mulitpaths, attack sequence S are taken out from Q, according to not The attack sequence is improved with path supplement.After selected all paths, the leaf node is deleted, and attack sequence S is relay Enter in set Q.
C3, step C1 is repeated, until only surplus root node in Bayesian network attack graph, takes out all attack sequences in set Q Column, obtain final result.
Detailed description of the invention
Fig. 1 is the flow chart of mode under specific implementation method middle line of the present invention.
Fig. 2 is the flow chart of on-line mode in specific implementation method of the present invention.
Fig. 3 is the flow chart for carrying out the excavation of multi-step attack scene in specific implementation method of the present invention from Bayes's attack graph.
Specific embodiment
To be clearer and more comprehensible features described above and advantage of the invention, With reference to embodiment with attached drawing to this hair Bright method is described in further detail.
As shown in Figure 1, the multi-step attack scene excavation side of the invention based on neural network and Bayesian network attack graph Mode under the line of method, method includes the following steps:
Step 101, the related alarm quantity (Numbers of related alert) for extracting IDS alarm log, alarm Density (Alert density) alerts periodically (Alert periodicity) these three attributes.
Step 102 constructs full Connection Neural Network using three attributes that back extracts, and exports as alarm log just True probability eliminates fault alarm.
All alarms are divided into L batch by step 103.To all batch by time window is divided, traversal is each All alarm event a conversion in each time window is merged into member alarm ma by all time windows in bi (1≤i≤L)
Step 104 successively extracts member alarm ma all in bi (1≤i≤L), according to L alarm sequence AS of generation.
L alarm sequence AS is generated m ASS from each alarm sequence according to Causal Rule by step 105.
Step 106, to each Attack Scenarios relating sequence ASS, construct the Bayesian network with 4 tuples (S, τ, ε, P) Attack graph (BAG).
As shown in Fig. 2, the multi-step attack scene excavation side of the invention based on neural network and Bayesian network attack graph The on-line mode of method, method includes the following steps:
Step 201, for neural network on-line parameters update, in batches by alarm log data with batch_size be one Group is sent into network, is updated using stochastic gradient descent method to neuron parameter.
Step 202 carries out updating on line respectively to the parameter (S, τ, ε, P) of Bayesian network attack graph.
As shown in figure 3, the side of the invention for carrying out multi-step attack sequential mining using complete Bayesian network attack graph Method, method includes the following steps:
The root node and some leaf node of step 301, fixed Bayesian network attack graph, if there are a plurality of between two o'clock Path then finds a multi-step attack sequence S along a wherein paths, which is put into set Q.
If between step 302, previous step root node and leaf node, there are mulitpaths, and attack sequence S is taken out from Q, The attack sequence is improved according to different paths supplement.After selected all paths, the leaf node is deleted, and by attack sequence S It is reentered into set Q.
Step 303 repeats step 301, until only surplus root node in Bayesian network attack graph, takes out all in set Q Attack sequence obtains final result.

Claims (4)

1. a kind of multi-step attack scene method for digging based on neural network and Bayesian network attack graph, which is characterized in that institute The method of stating includes:
To achieve this purpose, the present invention adopts the following technical scheme:
1, the multi-step attack scene method for digging based on neural network and Bayesian network attack graph, which is characterized in that including with Lower step:
It is respectively mode under on-line mode and line that this method, which is divided into both of which,.
A, mode under line: it is the pretreatment operation for being removed fault alarm and redundant alarm to IDS alarm log first, connects down Come utilize that treated IDS alarm log, the Bayesian network attack graph of building initialization alarm log;
B, on-line mode: utilizing a large amount of real-time logs information update iteration, improves attack graph model, improves Attack Scenarios and excavates effect Rate;
C, the excavation of multi-step attack scene is carried out according to the Bayes's attack graph of generation, obtains all different multisteps in alarm log Attack Scenarios sequence.
2. the multi-step attack scene excavation side according to claim 1 based on neural network and Bayesian network attack graph Method, which is characterized in that step A is further included steps of
A1, the related alarm quantity for extracting IDS alarm log, alarm density, periodically these three attributes are alerted;
A2, log is integrally divided into training set and verifying collection, constructs three layers of full connection nerve net using three attributes of training set The correctness of network output journal, and using verifying collection verifying Correctness of model, to eliminate fault alarm;
A3, for the alarm after screening, alarm event a is defined first, by a k tuple (at1,at2,at3,...,atk) composition, Wherein atiThe ith attribute of (1≤i≤k) expression alarm event.We press the timestamp (time of each alarm event Stamp it) sorts, according to setting time parameter T, with T hours for a batch, all alarms is divided into L batch.Each Batch is denoted as bi(1≤i≤L) divides time window by Δ t to all batch, traverses the institute in each bi (1≤i≤L) All alarm event a conversion in each time window is merged into member alarm ma by having time window, and ma meetsTo make to accuse Alert quantity is further reduced;
A4, successively member alarm ma all in bi (1≤i≤L) is extracted, according to L alarm sequence of generation.Alarm sequence is one The set for the member alarm that group is sequentially arranged, is denoted as AS, AS={ ma1,ma2,ma3,…,man, and meet mai.timestamp≤maj.timestamp(1≤i≤j≤n);
A5, L alarm sequence AS is generated into m ASS from each alarm sequence according to following Causal Rule.
If A and B is two different member alarms.
1.
{ 2. A [dstIPs]=B [srcIPs], A [dstPort]=B [srcPort] }
ASS is Attack Scenarios sequence in the step, i.e., attacker completes that IDS generation may be triggered when a multi-step attack activity Alarm sequence, wherein ASS={ ma1,ma2,...,mak},mai(1≤i≤j≤k) indicates i-th yuan of alarm, and meets mai.timestamp<maj.timestamp(1≤i≤j≤k);
A6, to each Attack Scenarios relating sequence ASS, initialize Bayesian network attack graph, and according to the sequence in ASS, Successively add node of the point as attack graph in sequence.Determine the new point being added in BAG and the pass for being present in BAG interior joint System, the value as node ε attribute.For each node, there is a CPT.When it is shown in the state for giving its father node The probability value of the node.After node is added to network every time, the CPT of each node is generated.It checks in alarm sequence AS All elements whether be node in BAG, if the element is not present in BAG, the addition into BAG is until element in AS All occur.It completes to construct by the above process, finally obtains the Bayesian network attack graph with 4 tuples (S, τ, ε, P) (BAG)。
3. the multi-step attack scene excavation side according to claim 1 based on neural network and Bayesian network attack graph Method, which is characterized in that step B is further included steps of
B1, it is that the on-line parameters of neural network are updated first, is directed to neural network, the hyper parameter of network is set, such as: net The learning rate learning_rate of network, size batch_size of network inputs etc..In batches by alarm log data with batch_ Size is one group of feeding network, is updated using stochastic gradient descent method to parameter;
B2, followed by the on-line parameters of Bayesian network attack graph are updated, are directed to S, in new AS sequence if there is New element then updates node representated by S in BAG.It is directed to τ, the multi-step attack sequence being directed in new ASS updates BAG The corresponding attack path of node of graph.It is directed to ε, updates the binary group < Sj, dj of the relationship between BAG interior joint and its father node >.It is directed to P, the probability of each alarming node is updated after each node is directed to father node by the impact probability of its father node Probability is tested, to update the probability distribution table (Conditional Probability Table, CPT) of the corresponding node.
4. according to claim 1 based in the excavation of the multi-step attack scene of neural network and Bayesian network attack graph Scene method for digging, which is characterized in that step C is further included steps of
The root node and some leaf node of C1, fixed Bayesian network attack graph, if there are mulitpath, edges between two o'clock Wherein a paths find a multi-step attack sequence S, which is put into set Q.
If between C2, previous step root node and leaf node, there are mulitpaths, and attack sequence S is taken out from Q, according to not going the same way Diameter supplement improves the attack sequence.After selected all paths, the leaf node is deleted, and attack sequence S is reentered into collection It closes in Q.
C3, step C1 is repeated, until only surplus root node in Bayesian network attack graph, takes out all attack sequences in set Q, obtain To final result.
CN201811532387.XA 2018-12-14 2018-12-14 Multi-step attack scene mining method Expired - Fee Related CN109327480B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811532387.XA CN109327480B (en) 2018-12-14 2018-12-14 Multi-step attack scene mining method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811532387.XA CN109327480B (en) 2018-12-14 2018-12-14 Multi-step attack scene mining method

Publications (2)

Publication Number Publication Date
CN109327480A true CN109327480A (en) 2019-02-12
CN109327480B CN109327480B (en) 2020-12-18

Family

ID=65257399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811532387.XA Expired - Fee Related CN109327480B (en) 2018-12-14 2018-12-14 Multi-step attack scene mining method

Country Status (1)

Country Link
CN (1) CN109327480B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213077A (en) * 2019-04-18 2019-09-06 国家电网有限公司 A kind of method, apparatus and system of determining electric power monitoring system security incident
CN110740059A (en) * 2019-10-11 2020-01-31 支付宝(杭州)信息技术有限公司 Online early warning processing method and system
CN110830504A (en) * 2019-11-28 2020-02-21 华北电力科学研究院有限责任公司 Network intrusion behavior detection method and system
CN110856178A (en) * 2019-11-05 2020-02-28 天津大学 Behavior identification method based on wireless network physical layer IQ signal
CN111880708A (en) * 2020-07-31 2020-11-03 北京微步在线科技有限公司 Interaction method and storage medium for network attack event graph
CN112333195A (en) * 2020-11-10 2021-02-05 西安电子科技大学 APT attack scene reduction detection method and system based on multi-source log correlation analysis
CN115396169A (en) * 2022-08-18 2022-11-25 上海交通大学 Method and system for multi-step attack detection and scene restoration based on TTP

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160205122A1 (en) * 2013-04-10 2016-07-14 Gabriel Bassett System and Method for Cyber Security Analysis and Human Behavior Prediction
CN106411921A (en) * 2016-10-31 2017-02-15 中国人民解放军信息工程大学 Multi-step attack prediction method based on cause-and-effect Byesian network
CN106850607A (en) * 2017-01-20 2017-06-13 北京理工大学 The quantitative estimation method of the network safety situation based on attack graph
CN108076040A (en) * 2017-10-11 2018-05-25 北京邮电大学 A kind of APT Attack Scenarios method for digging based on killing chain and fuzzy clustering
CN108769051A (en) * 2018-06-11 2018-11-06 中国人民解放军战略支援部队信息工程大学 A kind of network intrusions situation intention appraisal procedure based on alert correlation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160205122A1 (en) * 2013-04-10 2016-07-14 Gabriel Bassett System and Method for Cyber Security Analysis and Human Behavior Prediction
CN106411921A (en) * 2016-10-31 2017-02-15 中国人民解放军信息工程大学 Multi-step attack prediction method based on cause-and-effect Byesian network
CN106850607A (en) * 2017-01-20 2017-06-13 北京理工大学 The quantitative estimation method of the network safety situation based on attack graph
CN108076040A (en) * 2017-10-11 2018-05-25 北京邮电大学 A kind of APT Attack Scenarios method for digging based on killing chain and fuzzy clustering
CN108769051A (en) * 2018-06-11 2018-11-06 中国人民解放军战略支援部队信息工程大学 A kind of network intrusions situation intention appraisal procedure based on alert correlation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李思达: "IDS告警信息关联分析系统的研究与实现", 《中国优秀硕士学位论文全文数据库(电子期刊)》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213077A (en) * 2019-04-18 2019-09-06 国家电网有限公司 A kind of method, apparatus and system of determining electric power monitoring system security incident
CN110213077B (en) * 2019-04-18 2022-02-22 国家电网有限公司 Method, device and system for determining safety event of power monitoring system
CN110740059A (en) * 2019-10-11 2020-01-31 支付宝(杭州)信息技术有限公司 Online early warning processing method and system
CN110740059B (en) * 2019-10-11 2022-07-22 支付宝(杭州)信息技术有限公司 Online early warning processing method and system
CN110856178A (en) * 2019-11-05 2020-02-28 天津大学 Behavior identification method based on wireless network physical layer IQ signal
CN110830504A (en) * 2019-11-28 2020-02-21 华北电力科学研究院有限责任公司 Network intrusion behavior detection method and system
CN111880708A (en) * 2020-07-31 2020-11-03 北京微步在线科技有限公司 Interaction method and storage medium for network attack event graph
CN112333195A (en) * 2020-11-10 2021-02-05 西安电子科技大学 APT attack scene reduction detection method and system based on multi-source log correlation analysis
CN112333195B (en) * 2020-11-10 2021-11-30 西安电子科技大学 APT attack scene reduction detection method and system based on multi-source log correlation analysis
CN115396169A (en) * 2022-08-18 2022-11-25 上海交通大学 Method and system for multi-step attack detection and scene restoration based on TTP

Also Published As

Publication number Publication date
CN109327480B (en) 2020-12-18

Similar Documents

Publication Publication Date Title
CN109327480A (en) A kind of multi-step attack scene method for digging based on neural network and Bayesian network attack graph
Peel et al. Detecting change points in the large-scale structure of evolving networks
CN105279365B (en) For the method for the sample for learning abnormality detection
Du et al. GAN-based anomaly detection for multivariate time series using polluted training set
CN103530540A (en) User identity attribute detection method based on man-machine interaction behavior characteristics
Opolka et al. Spatio-temporal deep graph infomax
Sebestyen et al. A taxonomy and platform for anomaly detection
Gong et al. Causal discovery from temporal data: An overview and new perspectives
CN110580213A (en) Database anomaly detection method based on cyclic marking time point process
Money et al. Sparse online learning with kernels using random features for estimating nonlinear dynamic graphs
Qin et al. Evaluation of goaf stability based on transfer learning theory of artificial intelligence
CN104899507A (en) Detecting method for abnormal intrusion of large high-dimensional data of network
CN103793438A (en) MapReduce based parallel clustering method
Deng et al. Disentangling Structured Components: Towards Adaptive, Interpretable and Scalable Time Series Forecasting
Dakiche et al. Sensitive analysis of timeframe type and size impact on community evolution prediction
CN107454089A (en) A kind of network safety situation diagnostic method based on multinode relevance
Čavojský et al. Comparative Analysis of Feed-Forward and RNN Models for Intrusion Detection in Data Network Security with UNSW-NB15 Dataset
Yu et al. MAG: A novel approach for effective anomaly detection in spacecraft telemetry data
Xu et al. Concept drift and covariate shift detection ensemble with lagged labels
Wang et al. Early diagnosis of Parkinson's disease with Speech Pronunciation features based on XGBoost model
CN116306780B (en) Dynamic graph link generation method
CN113254485A (en) Real-time data flow abnormity detection method and system
Thi et al. One-class collective anomaly detection based on long short-term memory recurrent neural networks
Zhao et al. Mdgad: Meta domain generalization for distribution drift in anomaly detection
CN115081555A (en) Anomaly detection method and device based on generation countermeasure and bidirectional cyclic neural network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201218