期刊文献+

基于随机森林的分层木马检测技术研究 被引量:2

Hierarchical Detection of Trojan Behavior based on Random Forest
在线阅读 下载PDF
导出
摘要 为了应对以未知木马为核心的APT类攻击带来的威胁,对基于数据流的木马检测技术进行了研究。提出一种基于分层的多维通信特征的木马检测方法,检测网络数据流中的木马数据。在对已有分类检测算法调研的基础上,创新的将随机森林算法应用于训练集,以建立检测模型,创新的建立了分层评分策略,为分析人员提供可信的检测结果。通过实验将该方法与三种常用的机器学习算法对比,在数据流的检测方面,该方法的准确率至少提高了1.8%,误报率最少降低了2.77%。 In order to deal with the threat from APT attacks with unknown Trojan as the core, Trojan detec- tion technology based on net flows is studied and discussed. A method based on multidimensional features from different layers for Trojan detection is proposed, thus to detect Trojan data in the network data flows. Based on intestigation of the existing detection technology, the random forest algorithm is applied to training data set, thus to construct the detection model, establish hierarchical scoring policy, and providing a trusted detection result for analysts. Experiment and comparison of the three learning algorithms indicate that this method could improve accuracy rate at least 1.8% and reduce the false alarm rate at least 2.77% in the detection of Trojans.
出处 《通信技术》 2016年第4期475-480,共6页 Communications Technology
关键词 木马检测 随机森林 多维特征 APT攻击 分层检测 trojan detection random forest multi-dimensional features APT attack hierarchical detection
  • 相关文献

参考文献13

  • 1瑞星.瑞星2015年中国信息安全报告[EB/OL].(2016-01-20) [2016-03-02] . http://it. rising, com.cn/dongtai/18131. html.
  • 2Fire Eye, Advanced Targeted Attacks: How to Protect A-gainst the New Generation of Cyber Attacks. [ EB/OL].[2016-03 -02 ]. http://www2. fireeye. com/rs/fireye/images/fireeye - ad vanced-targeted- attacks. pdf.
  • 3李世淙,云晓春,张永铮.一种基于分层聚类方法的木马通信行为检测模型[J].计算机研究与发展,2012,49(S2):9-16. 被引量:13
  • 4周赵军,张剑,彭春林.多Web代理技术在木马通信中的实现[J].通信技术,2012,45(8):73-76. 被引量:1
  • 5WOLPERT D H. Stacked Generalization [ J ]. NeuralNetworks, 1992,5(2) : 241-259.
  • 6Breiman L. Bagging Predictors [ J]. Machine Learning,1996,24(2) : 123-140.
  • 7Dietterich T G. Ensemble Methods in Machine Learning[M]. Multiple Classifier Systems. Springer Berlin Hei-delberg, 2000: 1-15.
  • 8方匡南,吴见彬,朱建平,谢邦昌.随机森林方法研究综述[J].统计与信息论坛,2011,26(3):32-38. 被引量:804
  • 9ZHANG Xiao-chen,UU Sheng-li,MENG Lei,SHI Yun—fang. Trojan Detection based on Network Flow Clustering.Multimedia Information Networking and Security(MINES),2012 Fourth International Conference on DOI:10.1109/MINES. 2012.242[ C ]. 2012:947-950.
  • 10Ponomarev S,Durand J, Wallace N, et al. Evaluationof Random Projection for Malware Classification [ C ]Software Security and Reliability - Companion ( SERE -C) , 2013 IEEE 7th International Conference on IEEE,2013;68-73.

二级参考文献92

共引文献820

同被引文献10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部