• Tidak ada hasil yang ditemukan

Intrusion/Anomaly Detection and Malware Mitigation

N/A
N/A
Nguyễn Gia Hào

Academic year: 2023

Membagikan "Intrusion/Anomaly Detection and Malware Mitigation"

Copied!
101
0
0

Teks penuh

Therefore, in this paper, we propose an effective intrusion detection model based on pls-logistic regression with feature augmentation. In this paper, we proposed an effective intrusion detection model based on pls-logistic with feature augmentation.

Table 2. Performances of proposed methods
Table 2. Performances of proposed methods

2 Related Work

Malicious Traffic Detection

Many web application attacks use HTTP, such as Cross-site scripting attack (XSS), SQL injection, and so on. 3) The HTTP protocol is transmitted in clear text, which makes it easier to analyze network behavior. The attention mechanism can automatically dig out critical parts, which can improve the detection capabilities of the model.

Pattern Mining Method

3 Preliminaries

DeepHTTP Architecture and Overview

Level of training. The main task of this phase is to train the model (AT-Bi-LSTM). Detection rate. A pre-trained model and a "rule engine" are used to detect traffic irregularities.

Fig. 1. DeepHTTP architecture.
Fig. 1. DeepHTTP architecture.

Data Preprocessing

Mine stage. The main work in this phase is to verify the abnormal traffic labeled by the model and then extract malicious patterns. The types of data we currently recognize include hash (MD5, SHA and Base64), hexadecimal, binary, Arabic numerals and English alphabet (uppercase, lowercase and mixed letters).etc.

Table 1. Characters replacement rules.
Table 1. Characters replacement rules.

4 Our Approach

Anomaly HTTP Traffic Detection

Since the index of 'admin' in vocabulary is 3, the second digit in the vector is 3. The backward LSTM←f reads the input sequence in the reverse order and produces a series of backward hidden states.

Mining Stage

The goal of this step is to uncover words that not only occur frequently in this cluster, but are also recognized by the model as key parts. The malicious pattern can be used as an effective basis for security personnel to extract new filtering rules.

5 Evaluation

  • Dataset
  • Validation of Structural Feature Extraction Method
  • Model Comparison
  • Malicious Pattern Mining

A collection of malicious entries detected by the model but not detected by the "Rule Engine". According to the value of RCR, Doc2vec_Bi-LSTM, Character_level_CNN and AT-Bi-LSTM can basically cover the detection results of the "Rule Engine".

Fig. 5. Accuracy curve and loss curve.
Fig. 5. Accuracy curve and loss curve.

6 Conclusion

To further illustrate the performance of the proposed model in extracting malicious patterns, we visualize the pattern extraction results of this set (see Fig.9). The darker the color of the square, the more times the words appear together.

In: Proceedings of the 23rd International Conference on ACM SIGKDD on Knowledge Discovery and Data Mining, pp. In: Proceedings of the 22nd International Conference on ACM SIGKDD on Knowledge Discovery and Data Mining.

Social Network Security and Privacy

Prediction Algorithm in Social Network

1 Introduction

There are three scenarios of user location prediction in social networks, such as the user's frequent location prediction, the prediction of the location of messages posted on the user's social network, and the forecasting of the locations mentioned in messages. 16] expand the concept of location prediction to location label propagation, which is made of the location of the label space to explain the location of the label propagation, they believe that the position of the user through the iterative process that many times.

3 Related Concept and Problem Definition

It means that the size of the similarity denominator between public hop-hopping neighbors between nodes subtracts two nodes. Now the definition of the location prediction problem is given: In the social network G, the unknown location information of the user, according to the location information and the users of their neighbors, to predict the unknown location information of the user, predicting the probability of the position of L.

4 Label Propagation Based User Location Prediction Algorithm

In Algorithm 2, the location prediction algorithm based on tag propagation in the iterative process of user location tags is updated, and the user's location information is taken into account by the location information of neighbors and the user's participation in offline activities, which significantly improves the accuracy of user location prediction, and in the operation of the tag propagation algorithm, the data sets are prior, and the processing improves the operation of the tag propagation algorithm of the user location prediction algorithm, we will prove the following through experiments.

5 Experiment Result and Analysis

Data Set Description

Experimental Results Analysis

Relevant experiments show that the algorithm proposed in this paper improves the accuracy of user location prediction and reduces the time cost of the algorithm. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp.

Table 1. Data sets description
Table 1. Data sets description

Collection Method with Adaptive GPS Discretization

To prevent noise from overwhelming the actual signal results, the local differential privacy-compliant data collection method will only count the frequency of frequent item sets. This scheme is a geographic location collection scheme based on the concept of local differential privacy inference, which is known to have high data utilization.

3 System Overview

In addition, in 2016, researchers [12] first applied the concept of local differential privacy to the field of geographic location collection research, and the scheme adopted a binary local hash method for location data collection. In response to the problem in (1), our method first divides the user set into two disjoint sets, the first set is used to compute frequent itemsets of geographic location.

4 Module Design

  • Location Division Module
  • CS= set of four sub-areas of rt 3: count=0
  • while D!=
  • choose batch_size users from D, represented as G
  • delete G elements from D 7: F F U G
  • for every user u in G do
  • return root
    • Personalized Location Privacy
    • Location Density Collection Module

10 line, IsInCell is used to simulate the process of making a query request to the sampled user, and the implementation of the IsInCell function is given in Algorithm 2. It should be noted that in our method, Location collection process must be invoked for each set of users who designate the same privacy protection area.

Fig. 2. Schematic diagram of geographical location division method based on quadtree Because the local differential privacy based method can only collect the frequency of frequent itemsets, it is necessary to ensure that the frequency of user access in eac
Fig. 2. Schematic diagram of geographical location division method based on quadtree Because the local differential privacy based method can only collect the frequency of frequent itemsets, it is necessary to ensure that the frequency of user access in eac

5 Experimental Validation

Experiment Setup

The basic idea of ​​the frequency estimation process in Algorithm 5 is the same as the random response mechanism. After eliminating the bias in line 5, we can obtain the estimated frequency of the target attribute.

Experiment Results

As the dataset size increased, the KL divergence indicator increased significantly, but the top-k accuracy rate remained almost unchanged. In: Proceedings of the 12th International Conference on Scientific and Statistical Database Management, pp.

Fig. 5. Top-K accuracy of collected location results. K = 100.
Fig. 5. Top-K accuracy of collected location results. K = 100.

Systems Security

In summary, the security problems faced by SI are more severe than those of TMCS. However, Sat5G has done a preliminary analysis of IS security issues, but it is not comprehensive enough.

3 Analysis of SI Security

  • Overview of Security Issues of SI
  • National Security Issues National and Military Security
  • Network Security Issues Identity Impersonation
  • Equipment Security Issues Malicious Satellite Control

With the accelerated development of the form of war, a large number of intelligent equipment appears in the war. The attacker can use the VLEO or LEO satellite in the overseas satellite constellation to intercept the service data on the user link and feeder link of the domestic satellite system.

Table 1. Security issues of SI.
Table 1. Security issues of SI.

4 Conclusion

We provide a comprehensive comparison of the detection capabilities and operating principles of the cyberspace search engines. The working principles of cyberspace search engines are very different from the web search engines like Google, Baidu.

2 Supporting Internet Protocols

Global security companies and research institutions have developed many search engines, the most famous of which are: Shodan (www. shodan.io) Censys (Censys.io) from the USA, BinaryEdge (www.binaryedge.io) from Europe and ZoomEye (www.zoomeye.org) Fofa (www.fofa.so) from China. Based on this, we obtained lists of all supported engine protocols from official websites, user manuals, APIs and some technical forums.

3 Total Amounts of Detected Devices

Due to the different statistical caliber of network protocols, there may be some variance in the comparison results. As you can see in the table, ZoomEye (nearly 1.2 billion) and Shodan (over 0.4 billion) have the strongest detection capabilities.

4 Device Information

We divide the IPv4 address space into 256 parts and retrieve each address block with Censys, and calculate the manufacturer's brands of specific types in the returned results, then obtain the total number as a summary. It should be noted that, due to the lack of industry standards in network device classification, there is a statistical caliber of comparison results.

5 Scanning Frequency

6 System Architecture

In the task execution phase, the task is sent to multiple channels, including port scanning, screenshot, OCR and other technologies. During the service phase, the processed data will be sent to users through a real-time information flow or deeply analyzed by MapReduce, Kibana or InfluxDB.

7 Third Party Databases

In the storage stage, the collected information will be divided into original data and processed data, and stored in the database.

8 Probes Distribution

Because the honeypots do not actively interact with other devices, the data received in the honeypots is most likely sent by the evidence. Table 6 shows the global probe distribution of Shodan, Censys and BinaryEdge recorded by BinaryEdge for a period of 2000 days.

Table 5. Probes distribution marked by GreyNoise Shodan Censys BinaryEdge ZoomEye United
Table 5. Probes distribution marked by GreyNoise Shodan Censys BinaryEdge ZoomEye United

9 Conclusion

Management for Banks

The capability of active risk discovery for security assets can make security operation more accurate and targeted. In view of the previous three aspects of network security asset management design, this article conducts a literature review.

2 Detection of Network Security Assets

Application means using the data of network security assets managed in multiple dimensions to embody their value. To detect vulnerability efficiently, automatic tools such as Nmap, Xscan, Goby, Nessus are needed to detect assets and vulnerabilities [10,11].

3 Management of Network Security Assets

4 Applications of Network Security Assets

In the case of the asset management of FIFTH THIRD BANK in the United States, attention should be paid to both the security management of network security assets and the degree of continuity of compliance in order to provide a more comprehensive guarantee of operations [29]. Based on network flow analysis, asset baseline is determined to focus on dynamic data changes to ensure asset security [31].

5 Design of Network Security Assets Management System

Asset management means detecting unregistered assets, which is the most practical application in secure asset management. A complete asset perspective means connecting and displaying asset data from various sources to provide multi-directional information for security operations.

6 Conclusions

Xiao, Y., He, M., Wang, L.: Application research and practice of telecommunication operators' network asset security management technology. Zhao, C., Sun, H., Wang, G., Lu, X.: Network security analysis of power information system based on big data.

Isolation

  • Resource Software Isolation
  • Resource Hardware Isolation
  • Current Status of Research on Resource Isolation of Vehicle System
  • Current Status of Anti-virus Software Running on Vehicle Systems

Can we just install antivirus software in the vehicle system to solve these problems [9]? the answer is negative. Due to the particularity of the on-board system itself, it requires extremely high security.

Fig. 1. Basic architecture of resource software isolation
Fig. 1. Basic architecture of resource software isolation

3 Modeling of Vehicle Resource Isolation System

Isolation Model Design

Through such a symbiosis method, it can not only provide strong security for the vehicle, but also requests for exclusive resources that will destroy critical mission.

Implementation and Verification of on-Board System

  • CPU Isolation Design
  • Device Isolation Design

The Software Reliability Research Statement mentions that errors in device drivers account for 70% or more of the entire system. Isolation of upstream device drivers can also effectively reduce the system error rate and improve system reliability.

Fig. 4. Processor isolation model
Fig. 4. Processor isolation model

Test and Analysis

  • Test Environment
  • CPU Isolation Testing
  • PCI Device Isolation Testing
  • Memory Isolation Testing
  • Install a Simple Behavior Detection Engine Testing

In this article, each client is allocated a completely isolated area of ​​memory during client initialization by VMM. In the linux-arm-demo client configuration, there are 4 cores in total and the client occupies 3 CPUs in total.

Table 1. TestBed
Table 1. TestBed

Gambar

Fig. 1. DeepHTTP architecture.
Fig. 3. Model architecture.
Fig. 4. The architecture of mining stage.
Table 4. Model performance in labeled dataset.
+7

Referensi

Dokumen terkait

The algorithm uses a set of frequency response samples to come up with rational models so that the L2-gap between the observations and the identified model is minimized.. Each iteration