• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

应用最大最小距离(MMD)数据挖掘技术匹配网络流量以进行跳板入侵检测。

Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection.

作者信息

Yang Jianhua, Wang Lixin

机构信息

TSYS School of Computer Science, Columbus State University, Columbus, GA 31907, USA.

出版信息

Sensors (Basel). 2021 Nov 10;21(22):7464. doi: 10.3390/s21227464.

DOI:10.3390/s21227464
PMID:34833539
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8618504/
Abstract

A long interactive TCP connection chain has been widely used by attackers to launch their attacks and thus avoid detection. The longer a connection chain, the higher the probability the chain is exploited by attackers. Round-trip Time (RTT) can represent the length of a connection chain. In order to obtain the RTTs from the sniffed Send and Echo packets in a connection chain, matching the Sends and Echoes is required. In this paper, we first model a network traffic as the collection of RTTs and present the rationale of using the RTTs of a connection chain to represent the length of the chain. Second, we propose applying MMD data mining algorithm to match TCP Send and Echo packets collected from a connection. We found that the MMD data mining packet-matching algorithm outperforms all the existing packet-matching algorithms in terms of packet-matching rate including sequence number-based algorithm, Yang's approach, Step-function, Packet-matching conservative algorithm and packet-matching greedy algorithm. The experimental results from our local area networks showed that the packet-matching accuracy of the MMD algorithm is 100%. The average packet-matching rate of the MMD algorithm obtained from the experiments conducted under the Internet context can reach around 94%. The MMD data mining packet-matching algorithm can fix the issue of low packet-matching rate faced by all the existing packet-matching algorithms including the state-of-the-art algorithm. It is applicable to network-based stepping-stone intrusion detection.

摘要

攻击者广泛使用长交互TCP连接链来发动攻击并避免被检测到。连接链越长,被攻击者利用的可能性就越高。往返时间(RTT)可以表示连接链的长度。为了从连接链中嗅探到的发送和回显数据包中获取RTT,需要对发送和回显进行匹配。在本文中,我们首先将网络流量建模为RTT的集合,并阐述使用连接链的RTT来表示链长度的基本原理。其次,我们提出应用MMD数据挖掘算法来匹配从连接中收集的TCP发送和回显数据包。我们发现,MMD数据挖掘数据包匹配算法在数据包匹配率方面优于所有现有的数据包匹配算法,包括基于序列号的算法、Yang的方法、阶梯函数、数据包匹配保守算法和数据包匹配贪婪算法。我们局域网的实验结果表明,MMD算法的数据包匹配准确率为100%。在互联网环境下进行的实验中获得的MMD算法的平均数据包匹配率可以达到94%左右。MMD数据挖掘数据包匹配算法可以解决所有现有数据包匹配算法(包括最先进的算法)面临的数据包匹配率低的问题。它适用于基于网络的跳板入侵检测。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ab/8618504/03539a2f4633/sensors-21-07464-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ab/8618504/83061d42ae06/sensors-21-07464-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ab/8618504/3f91558dd46a/sensors-21-07464-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ab/8618504/c7e618b2fd00/sensors-21-07464-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ab/8618504/3e9bd332ccd9/sensors-21-07464-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ab/8618504/03539a2f4633/sensors-21-07464-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ab/8618504/83061d42ae06/sensors-21-07464-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ab/8618504/3f91558dd46a/sensors-21-07464-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ab/8618504/c7e618b2fd00/sensors-21-07464-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ab/8618504/3e9bd332ccd9/sensors-21-07464-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ab/8618504/03539a2f4633/sensors-21-07464-g005.jpg

相似文献

1
Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection.应用最大最小距离(MMD)数据挖掘技术匹配网络流量以进行跳板入侵检测。
Sensors (Basel). 2021 Nov 10;21(22):7464. doi: 10.3390/s21227464.
2
Detection of Middlebox-Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Models.基于多种机器学习模型的医疗物联网中基于中间盒的攻击检测。
Comput Intell Neurosci. 2022 Nov 28;2022:2037954. doi: 10.1155/2022/2037954. eCollection 2022.
3
A Hybrid CPU/GPU Pattern-Matching Algorithm for Deep Packet Inspection.一种用于深度包检测的混合CPU/GPU模式匹配算法。
PLoS One. 2015 Oct 5;10(10):e0139301. doi: 10.1371/journal.pone.0139301. eCollection 2015.
4
A new split based searching for exact pattern matching for natural texts.一种新的基于分割的自然文本精确模式匹配搜索方法。
PLoS One. 2018 Jul 26;13(7):e0200912. doi: 10.1371/journal.pone.0200912. eCollection 2018.
5
A TCP Acceleration Algorithm for Aerospace-Ground Service Networks.一种空天地一体化服务网络的 TCP 加速算法。
Sensors (Basel). 2022 Nov 26;22(23):9187. doi: 10.3390/s22239187.
6
A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks.无线传感器网络中针对内部人员分组丢弃攻击的混合信任模型。
Sensors (Basel). 2023 Apr 30;23(9):4407. doi: 10.3390/s23094407.
7
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware.利用异构硬件加速加密网络流量中的入侵检测
Sensors (Basel). 2021 Feb 6;21(4):1140. doi: 10.3390/s21041140.
8
Traffic Priority Based Channel Assignment Technique for Critical Data Transmission in Wireless Body Area Network.基于流量优先级的无线体域网关键数据传输信道分配技术。
J Med Syst. 2018 Sep 20;42(11):206. doi: 10.1007/s10916-018-1054-y.
9
Application Layer ARQ Algorithm for Real-Time Multi-Source Data Streaming in UAV Networks.无人机网络中实时多源数据流的应用层自动重传请求算法
Sensors (Basel). 2021 Aug 27;21(17):5763. doi: 10.3390/s21175763.
10
Routing Strategies for Isochronal-Evolution Random Matching Network.等时演化随机匹配网络的路由策略
Entropy (Basel). 2023 Feb 16;25(2):363. doi: 10.3390/e25020363.