期刊文献+

基于多技术融合的智能高级攻击监测系统设计

Design of Intelligent Advanced Attack Monitoring System Based on Multi-technology Fusion
在线阅读 下载PDF
导出
摘要 为应对新型电力系统和网络数字化设备发展中网络安全面临的挑战,文章提出一种基于多技术融合的智能高级攻击监测系统。系统采用分层设计,包含流量层、解析层和检测层,以此实现对数据的全面捕获与深度分析。在研究过程中,运用了深度包检测技术、智能化检测技术以及可编程对抗技术,构建了特征库模块、智能检测模块和插件检测模块,并借助机器学习算法增强智能检测能力。实验结果表明,该系统能够有效地监测已知和未知的攻击流量,为网络安全攻击监测提供了一种全面的解决方案。 In order to address the challenges of network security in the development of new power systems and network digital equipment,this paper proposes an intelligent advanced attack monitoring system based on multi-technology fusion.The system adopts layered design,including traffic layer,parsing layer and detection layer,so as to realize the comprehensive capture and in-depth analysis of data.In the research process,the Deep Packet Inspection technology,intelligent detection technology and programmable countermeasure technology are used to construct the feature library module,intelligent detection module and plugin detection module,and the Machine Learning algorithm is used to enhance the intelligent detection ability.The experimental results show that the system can effectively monitor known and unknown attack traffic,and provides a comprehensive solution for network security attack monitoring.
作者 刘玉婷 杭菲璐 谢林江 LIU Yuting;HANG Feilu;XIE Linjiang(Information Center of Yunnan Power Grid Co.,Ltd.,Kunming 650217,China)
出处 《现代信息科技》 2025年第3期170-176,182,共8页 Modern Information Technology
关键词 网络安全 高级攻击监测 多技术融合 深度包检测 智能化检测 可编程对抗 network security advanced attack monitoring multi-technology fusion Deep Packet Inspection intelligent detection programmable countermeasure
  • 相关文献

参考文献7

二级参考文献38

  • 1邹福泰,俞汤达,许文亮.基于隐马尔可夫模型的加密恶意流量检测[J].软件学报,2022,33(7):2683-2698. 被引量:19
  • 2刘欣然.网络攻击分类技术综述[J].通信学报,2004,25(7):30-36. 被引量:38
  • 3龚俭,彭艳兵,杨望,刘卫江.TCP流的宏观平衡性[J].计算机学报,2006,29(9):1561-1571. 被引量:5
  • 4[1]Roesch M. Snort-Lightweight Intrusion Detection For Networks[EB/OL]. www.snort.org,1999-09.
  • 5[2]Desai N. Increasing Performance in High Speed NIDS,A look at Snorts Internals[EB/OL]. http://www.cis.udel.edu/~zhi/www.docshow.net,2002-03.
  • 6SMAHA S E. Haystack: An intrusion detection system[ C]// Pro- ceedings of IEEE 4th Aerospace Computer Security Applications Conference. Piscataway: IEEE, 1988:37-44.
  • 7KIM S S, REDDY A L N. Detecting traffic anomalies at the source through aggregate analysis of packet header data[ EB/OL]. [ 2013- 02-10]. http://www, ece. tamu. edu/-reddy/papers/skim_net04. pdf.
  • 8LAKHINA A, CROVELLA M, DIOT C. Mining anomalies using traffic feature distributions [ C ]// Proceedings of the 2005 ACM SIGCOMM 2005. New York:ACM, 2005:9 -20.
  • 9VELARDE-ALVARADO P, VARGAS-ROSALES C, TORRES- ROMAN D, et al. Detecting anomalies in network traffic using the method of remaining elements [ J ]. IEEE Communications Letters, 2009, 13(6) : 462 -464.
  • 10ZIVIANI A, GOMES A T A, MONSORES M L. Network anomaly detection using nonextensive entropy [ J ]. IEEE Communications Letters, 2007, 11 (12) : 1034 - 1036.

共引文献173

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部