期刊文献+

基于多BP神经网络的内存组合特征分类方法 被引量:2

Memory combined feature classification method based on multiple BP neural networks
在线阅读 下载PDF
导出
摘要 针对内存数据在攻击行为发生后会发生改变,而传统完整性度量系统使用的基准值度量存在检测率低、灵活性不足等问题的现象,提出一种基于多反向传播(BP)神经网络的内存组合特征分类方法。首先,将内存数据通过度量对象提取算法(MOEA)提取特征值;然后,分别使用不同的BP神经网络进行模型训练;最后,再通过一个BP神经网络对所得数据进行汇总,并得出操作系统安全状况评分。实验结果表明该方法与传统的使用基准值度量的完整性度量方法相比,检测准确率与普适性有较大提升;所提方法的检测准确率为98.25%,大于卷积神经网络(CNN)、K最邻近(KNN)算法与单BP神经网络,表明该方法能更加准确地发现攻击行为;所提方法的模型训练时间约为传统单BP神经网络的1/3,并且模型训练速度相较同类模型也有一定提升。 The memory data will change after occurring the attack behaviors,and benchmark measurement used by the traditional integrity measurement system has the problems of low detection rate and lack of flexibility.Aiming at the above problems,a memory combined feature classification method based on multiple Back Propagation(BP)neural networks was proposed.Firstly,the feature value of the memory data was extracted by Measuring Object Extraction Algorithm(MOEA).Then,the model was trained by different BP neural networks.Finally,a BP neural network was used to collect the obtained data and calculate the safety status score of the operating system.Experimental results show that compared with the traditional integrity measurement system using benchmark measurement,the proposed method has much higher accuracy and universality,and the proposed method has a detection accuracy of 98.25%,which is higher than those of Convolutional Neural Network(CNN),K-Nearest Neighbor(KNN)algorithm and single BP neural network,verifying the proposed method can detect attack behaviors more accurately.The proposed method has the model training time about 1/3 of the traditional single BP neural network,and also has the model training speed improved compared with similar models.
作者 段佳良 蔡国明 徐开勇 DUAN Jialiang;CAI Guoming;XU Kaiyong(Network Space Security Teaching and Research Room,Information Engineering University,Zhengzhou Henan 450001 China)
出处 《计算机应用》 CSCD 北大核心 2022年第1期178-182,共5页 journal of Computer Applications
关键词 内存特征 BP神经网络 完整性度量 组合特征 内核安全 memory feature Back Propagation(BP)neural network integrity measurement combined feature kernel security
  • 相关文献

参考文献11

二级参考文献65

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:365
  • 2Trusted Computing Group. TCG PC client specific implementation specification for conventional bios version 1.2, July 2005.
  • 3Apvrille A, Gordon D, Hallyn S, Pourzandi M, and Roy V. DigSig: Run-time authentication of binaries at kernel Level[C]. Proceedings of LISA '04 Eighteenth Systems Administration Conference. Atlanta, GA, USENIX Association November, 2004: 59-66.
  • 4Petroni N Jr and Fraser T, et al.. Copilot - A coprocessor -based kernel runtime integrity monitor[C]. Proceedings of the 13th conference on USENIX Security Symposium. San Diego, CA, 2004, Vol. 13: 13-13.
  • 5Sailer R, Zhang Xiao-lan, Jaeger T, and Van Doorn L. Design and implementation of a TCG-based integrity : architecture[C]. Proceedings of USENIX Security Symposium. Lake Tahoe, California, USA, ACM Press, Aug. 2004: 223-238.
  • 6Jaeger T, Sailer R, and Shankar U. PRIMA: Policy-reduced integrity t architecture[C]. Proceedings of the eleventh ACM symposium on Access control models and technologies. Lake Tahoe, California, USA, 2006: 19-28.
  • 7Shi E, Perrig A, and Van Doorn L. BIND: A fine-grained attestation service for secure distributed systems[C]. Proceeding of the IEEE Symposium on Security and Privacy. Oakland, CA, USA, IEEE Press, 2005: 154-168.
  • 8Loscocco P A, Wilson P W, Pendergrass J A, and McDonell C D. Linux kernel integrity measurement using contextual inspection[C]. Proceedings of the 2007 ACM workshop on Scalable trusted computing. Alexandria, Virginia, USA, 2007 21-29.
  • 9Thober M and Pendergrass J A. McDonell C D: Improving coherency of runtime integrity measurement[C]. Conference on Computer and Communications Security Proceedings of the 3rd ACM workshop on Scalable trusted computing. Alexandria, Virginia, USA, 2008: 51-60.
  • 10Gu Liang, Ding Xu-hua, Deng R H, Xie Bing, and Mei Hong. Remote attestation on program execution[C]. Conference on Computer and Communications Security Proceedings of the 3rd ACM workshop on Scalable trusted computing. Alexandria, Virginia, USA, 2008: 11-20.

共引文献254

同被引文献19

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部