检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:杜放 焦健[1] 焦立博 DU Fang;JIAO Jian;JIAO Li-bo(Computer School,Beijing Information Science&Technology University,Beijing 100101,China)
机构地区:[1]北京信息科技大学计算机学院,北京100101
出 处:《计算机工程与科学》2024年第7期1229-1236,共8页Computer Engineering & Science
基 金:国家自然科学基金(62202059)。
摘 要:在现代网络攻击中,攻击者常常利用各种反取证技术来掩盖他们的踪迹。反取证技术中的数据擦除的危害性较大,攻击者可以使用这种攻击来删除或破坏数据,从而达到销毁攻击证据、扰乱取证过程的目的。由于擦除活动自身的隐蔽性使其很难被察觉,因此利用基于因果关系的溯源技术,提出了一种反擦除数据检测模型。模型根据警报信息生成警报溯源图,并通过攻击行为特征为图中的每条路径计算异常分数,通过进一步筛选和聚合计算,最终生成攻击路径。实验结果表明,该模型可以较好地实现反取证擦除活动的溯源跟踪,并能提高反数据擦除攻击活动和正常活动之间的辨识度。In modern network attacks,attackers often use various anti-forensics techniques to conceal their tracks.The harm of data erasure in anti-forensics technology is significant.Attackers can use this attack to delete or destroy data,thereby destroying attack evidence and disrupting the forensics process.Due to the concealment of the erasure activity itself,it is difficult to detect.This paper proposes an anti-forensics check module(AFCM)using causal relationship based traceability technology.The model generates an alert traceability graph based on alert information,and calculates anomaly scores for each path in the graph through attack behavior characteristics.Through further filtering and aggregation calculations,the attack path is ultimately generated.The experimental results show that this model can effectively achieve traceability tracking of anti-forensics erasure activities and improve the identification between anti data erasure attack activities and normal activities.
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.15.7.155