Multi-step attack detection method based on network communication anomaly recognition

In view of the characteristics of internal fixed business logic,inbound and outbound network access behavior,two classes and four kinds of abnormal behaviors were defined firstly,and then a multi-step attack detection method was proposed based on network communication anomaly recognition.For abnorma...

Full description

Saved in:
Bibliographic Details
Main Authors: Ankang JU, Yuanbo GUO, Tao LI, Ziwei YE
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2019-07-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019142/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539347437846528
author Ankang JU
Yuanbo GUO
Tao LI
Ziwei YE
author_facet Ankang JU
Yuanbo GUO
Tao LI
Ziwei YE
author_sort Ankang JU
collection DOAJ
description In view of the characteristics of internal fixed business logic,inbound and outbound network access behavior,two classes and four kinds of abnormal behaviors were defined firstly,and then a multi-step attack detection method was proposed based on network communication anomaly recognition.For abnormal sub-graphs and abnormal communication edges detection,graph-based anomaly analysis and wavelet analysis method were respectively proposed to identify abnormal behaviors in network communication,and detect multi-step attacks through anomaly correlation analysis.Experiments are carried out on the DARPA 2000 data set and LANL data set to verify the results.The experimental results show that the proposed method can effectively detect and reconstruct multi-step attack scenarios.The proposed method can effectively monitor multi-step attacks including unknown feature types.It provides a feasible idea for detecting complex multi-step attack patterns such as APT.And the network communication graph greatly reduces the data size,it is suitable for large-scale enterprise network environments.
format Article
id doaj-art-589a38f9e33d438f87c88d61695a5588
institution Kabale University
issn 1000-436X
language zho
publishDate 2019-07-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-589a38f9e33d438f87c88d61695a55882025-01-14T07:17:17ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2019-07-0140576659728274Multi-step attack detection method based on network communication anomaly recognitionAnkang JUYuanbo GUOTao LIZiwei YEIn view of the characteristics of internal fixed business logic,inbound and outbound network access behavior,two classes and four kinds of abnormal behaviors were defined firstly,and then a multi-step attack detection method was proposed based on network communication anomaly recognition.For abnormal sub-graphs and abnormal communication edges detection,graph-based anomaly analysis and wavelet analysis method were respectively proposed to identify abnormal behaviors in network communication,and detect multi-step attacks through anomaly correlation analysis.Experiments are carried out on the DARPA 2000 data set and LANL data set to verify the results.The experimental results show that the proposed method can effectively detect and reconstruct multi-step attack scenarios.The proposed method can effectively monitor multi-step attacks including unknown feature types.It provides a feasible idea for detecting complex multi-step attack patterns such as APT.And the network communication graph greatly reduces the data size,it is suitable for large-scale enterprise network environments.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019142/multi-step attacknetwork anomalycommunication graphwavelet analysis
spellingShingle Ankang JU
Yuanbo GUO
Tao LI
Ziwei YE
Multi-step attack detection method based on network communication anomaly recognition
Tongxin xuebao
multi-step attack
network anomaly
communication graph
wavelet analysis
title Multi-step attack detection method based on network communication anomaly recognition
title_full Multi-step attack detection method based on network communication anomaly recognition
title_fullStr Multi-step attack detection method based on network communication anomaly recognition
title_full_unstemmed Multi-step attack detection method based on network communication anomaly recognition
title_short Multi-step attack detection method based on network communication anomaly recognition
title_sort multi step attack detection method based on network communication anomaly recognition
topic multi-step attack
network anomaly
communication graph
wavelet analysis
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019142/
work_keys_str_mv AT ankangju multistepattackdetectionmethodbasedonnetworkcommunicationanomalyrecognition
AT yuanboguo multistepattackdetectionmethodbasedonnetworkcommunicationanomalyrecognition
AT taoli multistepattackdetectionmethodbasedonnetworkcommunicationanomalyrecognition
AT ziweiye multistepattackdetectionmethodbasedonnetworkcommunicationanomalyrecognition