• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于动态网页浏览行为分析的物联网内部威胁检测融合模型。

A Fusion Model Based on Dynamic Web Browsing Behavior Analysis for IoT Insider Threat Detection.

机构信息

Institute of High Energy Physics, Chinese Academy of Sciences, 19B Yuquan Road, Shijingshan District, Beijing 100049, China.

出版信息

Sensors (Basel). 2022 Aug 28;22(17):6471. doi: 10.3390/s22176471.

DOI:10.3390/s22176471
PMID:36080931
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9460052/
Abstract

With the wide application of Internet of things (IoT) devices in enterprises, the traditional boundary defense mechanisms are difficult to satisfy the demands of the insider threats detection. IoT insider threat detection can be more challenging, since internal employees are born with the ability to escape the deployed information security mechanism, such as firewalls and endpoint protection. In order to detect internal attacks more accurately, we can analyze users' web browsing behaviors to identify abnormal users. The existing web browsing behavior anomaly detection methods ignore the dynamic change of the web browsing behavior of the target user and the behavior consistency of the target user in its peer group, which results in a complex modeling process, low system efficiency and low detection accuracy. Therefore, the paper respectively proposes the individual user behavior model and the peer-group behavior model to characterize the abnormal dynamic change of user browsing behavior and compare the mutual behavioral inconsistency among one peer-group. Furthermore, the fusion model is presented for insider threat detection which simultaneously considers individual behavioral abnormal dynamic changes and mutual behavioral dynamic inconsistency from peers. The experimental results show that the proposed fusion model can accurately detect insider threat based on the abnormal user web browsing behaviors in the enterprise networks.

摘要

随着物联网 (IoT) 设备在企业中的广泛应用,传统的边界防御机制难以满足内部威胁检测的需求。物联网内部威胁检测可能更加具有挑战性,因为内部员工天生就具备逃避部署的信息安全机制(如防火墙和端点保护)的能力。为了更准确地检测内部攻击,我们可以分析用户的网页浏览行为,以识别异常用户。现有的网页浏览行为异常检测方法忽略了目标用户的网页浏览行为的动态变化和目标用户在其对等组中的行为一致性,这导致建模过程复杂、系统效率低和检测精度低。因此,本文分别提出了个体用户行为模型和对等组行为模型,以描述用户浏览行为的异常动态变化,并比较对等组内的相互行为不一致性。此外,还提出了融合模型,用于内部威胁检测,同时考虑个体行为的异常动态变化和来自对等组的相互行为动态不一致性。实验结果表明,所提出的融合模型可以基于企业网络中异常用户的网页浏览行为准确地检测内部威胁。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/b6be38ad976e/sensors-22-06471-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/aacae0c13c52/sensors-22-06471-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/250570fb0a4d/sensors-22-06471-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/bbbf43a393f9/sensors-22-06471-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/62e040285ce6/sensors-22-06471-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/aa86ed184502/sensors-22-06471-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/a12367907c7f/sensors-22-06471-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/5f1f00d72ae1/sensors-22-06471-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/3b53441af585/sensors-22-06471-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/1b3e502affe8/sensors-22-06471-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/4fe9fd030d73/sensors-22-06471-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/f6d0ba6f83f1/sensors-22-06471-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/0cbd955da84e/sensors-22-06471-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/b6be38ad976e/sensors-22-06471-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/aacae0c13c52/sensors-22-06471-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/250570fb0a4d/sensors-22-06471-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/bbbf43a393f9/sensors-22-06471-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/62e040285ce6/sensors-22-06471-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/aa86ed184502/sensors-22-06471-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/a12367907c7f/sensors-22-06471-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/5f1f00d72ae1/sensors-22-06471-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/3b53441af585/sensors-22-06471-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/1b3e502affe8/sensors-22-06471-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/4fe9fd030d73/sensors-22-06471-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/f6d0ba6f83f1/sensors-22-06471-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/0cbd955da84e/sensors-22-06471-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1e0d/9460052/b6be38ad976e/sensors-22-06471-g013.jpg

相似文献

1
A Fusion Model Based on Dynamic Web Browsing Behavior Analysis for IoT Insider Threat Detection.基于动态网页浏览行为分析的物联网内部威胁检测融合模型。
Sensors (Basel). 2022 Aug 28;22(17):6471. doi: 10.3390/s22176471.
2
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.利用威胁建模方法识别和缓解物联网用例中的网络钓鱼攻击威胁。
Sensors (Basel). 2021 Jul 14;21(14):4816. doi: 10.3390/s21144816.
3
Toward Exposing Timing-Based Probing Attacks in Web Applications.针对Web应用程序中基于时间的探测攻击的揭露
Sensors (Basel). 2017 Feb 25;17(3):464. doi: 10.3390/s17030464.
4
Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs.通过访问日志的关系分析检测协作环境中的异常内部人员。
CODASPY. 2011;2011:63-74. doi: 10.1145/1943513.1943524.
5
Specializing network analysis to detect anomalous insider actions.专门进行网络分析以检测异常的内部人员行为。
Secur Inform. 2012 Feb 27;1(5). doi: 10.1186/2190-8532-1-5.
6
Leveraging Social Networks to Detect Anomalous Insider Actions in Collaborative Environments.利用社交网络检测协作环境中的异常内部人员行为。
ISI. 2011 Jul;2011:119-124. doi: 10.1109/ISI.2011.5984061.
7
Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats.追踪内部威胁者:一种用于内部威胁的区块链可追溯性系统。
Sensors (Basel). 2020 Sep 16;20(18):5297. doi: 10.3390/s20185297.
8
Enhancing Security of Web-Based IoT Services via XSS Vulnerability Detection.通过跨站脚本攻击漏洞检测增强基于Web的物联网服务安全性
Sensors (Basel). 2023 Nov 25;23(23):9407. doi: 10.3390/s23239407.
9
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.基于自适应机器学习的支持软件定义网络的物联网分布式拒绝服务攻击检测与缓解系统
Sensors (Basel). 2022 Mar 31;22(7):2697. doi: 10.3390/s22072697.
10
A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms.基于机器学习算法的物联网网络异常检测方案的综合研究。
Sensors (Basel). 2021 Dec 13;21(24):8320. doi: 10.3390/s21248320.