基于多源報(bào)警日志的網(wǎng)絡(luò)安全威脅態(tài)勢(shì)感知關(guān)鍵技術(shù)研究
[Abstract]:With the development of Internet technology and the continuous improvement of social information, the network has gradually become an indispensable part of people's production and life, and more attention has been paid to network security. A variety of security products are used to detect attack threats in the network and maintain the safe operation of the network. However, these security means can only play a specific role in a certain range, and there is a lack of effective data fusion and collaborative management mechanism. In the face of a lot of scattered information, network security managers can not deal with these threats of network attacks in a timely manner. In order to grasp the threat of network attack and maintain the operation of network security as a whole, the situational awareness technology of network security threat emerges as the times require, which has become a new hot spot in the research of network security. Network security threat situational awareness based on various network security protection equipment is the mainstream of current research, including intrusion detection equipment, intrusion prevention equipment, firewall and operating system alarm log. However, most of the research is to analyze and process all kinds of alarm logs separately, which can not effectively make use of the correlation and complementarity between the data, and the results can not accurately reflect the security threats faced by the current network. This paper is based on multi-source alarm log, from the network security threat situational awareness model. The key technologies of network security threat situational awareness are studied in several important aspects, such as the acquisition of threat situation information, the analysis of threat situation elements and so on, which mainly includes the following contents: 1. In the aspect of model research,. In view of the shortcomings of the existing network security situational awareness model applied to multi-source alarm log, a network security threat situational awareness model based on multi-source alarm log is proposed. According to the acquisition of threat situation data and the main line of threat situation element analysis, the corresponding solutions are given. 2. In the aspect of threat situation data and element analysis, the working principle, alarm log characteristics and format of common network security protection equipment are deeply analyzed, the corresponding processing methods are given, and the standardization model of threat situation data is put forward. The research on network attack is an important aspect of threat situational awareness. On the basis of deeply understanding network attack, aiming at the deficiency of the existing attack classification methods, this paper puts forward a attack classification system guided by attack process. In the processing of multi-source alarm log, the step-by-step strategy is adopted. Firstly, the aggregation analysis is carried out by using the similarity method of alarm attributes on a single source, and the network attack events are obtained. Secondly, the improved D / S evidence theory method is used for data fusion of multi-source attack events, and the attack events with high credibility are obtained, which are regarded as the elements of network security threat situation. 4. In the aspect of network attack event association analysis, a network attack event association analysis method based on reasoning model is proposed. Firstly, the fusion attack event is transformed into the corresponding attack semantics through the semantic mapping model. Secondly, all the possible attack conversion vectors are obtained by using the reasoning model. Finally, the network attack scene diagram reflecting the attack behavior is obtained by combining the association analysis algorithm, which shows the attack intention and effectively guides the network security protection work. Finally, the work of this paper is summarized, and the research work of network security threat situational awareness based on multi-source alarm log is prospected, and the next research direction is pointed out.
【學(xué)位授予單位】:解放軍信息工程大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 廖年冬;熊兵;胡琦;;增量挖掘?qū)崟r(shí)報(bào)警關(guān)聯(lián)研究[J];計(jì)算機(jī)工程與應(yīng)用;2012年04期
2 唐湘滟;朱幸輝;盛立新;陳曉珍;程杰仁;;基于IDMEF的信息安全事件標(biāo)準(zhǔn)化模型研究[J];網(wǎng)絡(luò)安全技術(shù)與應(yīng)用;2011年05期
3 韋勇;連一峰;馮登國(guó);;基于信息融合的網(wǎng)絡(luò)安全態(tài)勢(shì)評(píng)估模型[J];計(jì)算機(jī)研究與發(fā)展;2009年03期
4 劉海軍;許丹;周一宇;姜文利;;基于D-S證據(jù)理論多傳感器信息融合的輻射源及平臺(tái)識(shí)別[J];信號(hào)處理;2009年02期
5 王慧強(qiáng);賴積保;胡明明;梁穎;;網(wǎng)絡(luò)安全態(tài)勢(shì)感知關(guān)鍵實(shí)現(xiàn)技術(shù)研究[J];武漢大學(xué)學(xué)報(bào)(信息科學(xué)版);2008年10期
6 劉玉玲;杜瑞忠;趙衛(wèi)東;蔡紅云;;一種入侵場(chǎng)景構(gòu)建模型——BPCRISM[J];計(jì)算機(jī)研究與發(fā)展;2007年04期
7 王新昌;楊艷;劉育楠;;一種基于局域網(wǎng)絡(luò)監(jiān)控日志的安全審計(jì)系統(tǒng)[J];計(jì)算機(jī)應(yīng)用;2007年02期
8 黃藝海;胡君;;日志審計(jì)系統(tǒng)設(shè)計(jì)與實(shí)現(xiàn)[J];計(jì)算機(jī)工程;2006年22期
9 諸葛建偉;韓心慧;葉志遠(yuǎn);鄒維;;基于擴(kuò)展目標(biāo)規(guī)劃圖的網(wǎng)絡(luò)攻擊規(guī)劃識(shí)別算法[J];計(jì)算機(jī)學(xué)報(bào);2006年08期
10 陳秀真;鄭慶華;管曉宏;林晨光;;層次化網(wǎng)絡(luò)安全威脅態(tài)勢(shì)量化評(píng)估方法[J];軟件學(xué)報(bào);2006年04期
相關(guān)碩士學(xué)位論文 前1條
1 李晨e,
本文編號(hào):2508405
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2508405.html