基于Muscle的攻擊特征自動(dòng)提取方法研究
[Abstract]:Absrtact: with the increasing number of network attacks, all kinds of deformation, polymorphic techniques appear in large numbers, relying solely on security experts to obtain attack characteristics according to hindsight analysis, will cause serious delay in new attack detection. Automatic extraction of attack features can extract attack features quickly and accurately, and ensure the security and reliability of the network environment. In this paper, the existing methods of automatic extraction of attack features are analyzed, and the problems and developing directions of feature extraction are summarized. In this paper, the application of sequence alignment in automatic extraction of attack features is studied. When Needleman-Wunsch (NW) algorithm is applied to feature extraction, fragmentation will occur. The INW algorithm proposed in this paper reduces fragments by improving the similarity score function of double sequence alignment. The sub-sequence string. NJ algorithm, which has more semantic information, is a common evolutionary tree construction method, but it has the problem of evolutionary tree uncertainty. In this paper, INJ algorithm is proposed. When there is no common sequence between sequence pairs with minimum rate correction distance, multiple sequence pairs are added at the same time. Otherwise, the sequence pair added to the evolutionary tree is selected by comparing the sub-minimum rate correction distance and the sequence distance of the sequence. The experimental results show that the INW algorithm has less character feature fragments and higher continuity than NJ algorithm. The correct evolutionary tree. Muscle algorithm is an efficient multi-sequence alignment algorithm that synthesizes evolutionary and iterative alignment, but when applied to attack feature extraction, the evolutionary tree is uncertain and fragments are generated. This paper presents an improved algorithm-IMuscle. which can not eliminate noise interference and so on. IMuscle algorithm is divided into three stages: coarse alignment, improved incremental alignment and iterative improvement. In rough alignment, the noise is eliminated for the sequences which are not satisfied with the characteristics of the effective attack data stream, and the INW and INJ algorithms are used in the construction of the double sequence alignment and evolutionary tree. In the improved incremental alignment, the Kimura distance is greatly affected by the biological genetic model, so the normalized distance is used instead of the Kimura model to calculate the distance matrix again in this paper. The experimental results show that the weight IMuscle algorithm has a better ability to resist noise, and the comparison results can express the attack features more accurately. 25 figures, 12 tables, 54 references.
【學(xué)位授予單位】:中南大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前8條
1 于志宏;趙闊;胡亮;;基于協(xié)議分析的入侵檢測(cè)規(guī)則智能匹配[J];吉林大學(xué)學(xué)報(bào)(信息科學(xué)版);2008年02期
2 鄒權(quán);郭茂祖;王曉凱;張濤濤;;基于關(guān)鍵字樹的DNA多序列星比對(duì)算法[J];電子學(xué)報(bào);2009年08期
3 秦拯;尹毅;陳飛楊;陳薇娜;董銳;王澤平;;基于序列比對(duì)的攻擊特征自動(dòng)提取方法[J];湖南大學(xué)學(xué)報(bào)(自然科學(xué)版);2008年06期
4 趙旭;何聚厚;;基于NLA的Polymorphic蠕蟲特征自動(dòng)提取算法研究[J];計(jì)算機(jī)工程與應(yīng)用;2012年08期
5 唐勇;盧錫城;胡華平;朱培棟;;基于多序列聯(lián)配的攻擊特征自動(dòng)提取技術(shù)研究[J];計(jì)算機(jī)學(xué)報(bào);2006年09期
6 蔣建春,馬恒太,任黨恩,卿斯?jié)h;網(wǎng)絡(luò)安全入侵檢測(cè):研究綜述[J];軟件學(xué)報(bào);2000年11期
7 霍紅衛(wèi);肖智偉;;基于最大權(quán)值路徑算法的DNA多序列比對(duì)方法[J];軟件學(xué)報(bào);2007年02期
8 諸葛建偉;韓心慧;周勇林;宋程昱;郭晉鵬;鄒維;;HoneyBow:一個(gè)基于高交互式蜜罐技術(shù)的惡意代碼自動(dòng)捕獲器[J];通信學(xué)報(bào);2007年12期
,本文編號(hào):2149300
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2149300.html