• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Abnormal Event Correlation and Detection Based on Network Big Data Analysis

    2021-12-10 11:55:32ZhichaoHuXiangzhanYuJiantaoShiandLinYe
    Computers Materials&Continua 2021年10期

    Zhichao Hu,Xiangzhan Yu,*,Jiantao Shi and Lin Ye,2

    1School of Cyberspace Science,Harbin Institute of Technology,Harbin,150001,China

    2Department of Computer and Information Science,Temple University,Philadelphia,42101,USA

    Abstract:With the continuous development of network technology,various large-scale cyber-attacks continue to emerge.These attacks pose a severe threat to the security of systems,networks,and data.Therefore,how to mine attack patterns from massive data and detect attacks are urgent problems.In this paper,an approach for attack mining and detection is proposed that performs tasks of alarm correlation,false-positive elimination,attack mining,and attack prediction.Based on the idea of CluStream,the proposed approach implements a flow clustering method and a two-step algorithm that guarantees efficient streaming and clustering.The context of an alarm in the attack chain is analyzed and the LightGBM method is used to perform falsepositive recognition with high accuracy.To accelerate the search for the filtered alarm sequence data to mine attack patterns,the PrefixSpan algorithm is also updated in the store strategy.The updated PrefixSpan increases the processing efficiency and achieves a better result than the original one in experiments.With Bayesian theory,the transition probability for the sequence pattern string is calculated and the alarm transition probability table constructed to draw the attack graph.Finally,a long-short-term memory network and embedding word-vector method are used to perform online prediction.Results of numerical experiments show that the method proposed in this paper has a strong practical value for attack detection and prediction.

    Keywords:Attack scene;false positive;alarm correlation;sequence mining;multi-step attack

    1 Introduction

    With the continuous development of the Internet,the network industry has become increasingly prosperous.At the same time,however,cybercrime and threat activities have become a critical part of our daily life,and the importance of network security has continuously emerged as a central concern[1,2].Hacker activities infiltrate multiple environments such as the Internet of Things(IoT)and cloud computing[3].New technologies and applications provide new attack vectors for cybercrimes,which pose a significant threat to network system security and important data[4,5].

    At present,there are effective countermeasures against single-step attacks,such as SQL injection and DDOS[6].However,many novel attack types that are challenging to detect,especially multi-step attacks,have emerged in networks[7].These kinds of attacks can cause great difficulties to network researchers.There are two main reasons for choosing an approach to such attacks:first,advanced attackers usually choose medium-sized or large organizations with complex network topology and multi-layer security protection[8,9].The most valuable information is often stored in the final nodes that are inaccessible from the outside.It is almost impossible to complete an invasion with a single-step attack successfully.Second,if an attack is broken down into several independent steps,it will be more difficult for the victim to identify such an attack,especially if some steps do not pose a severe risk to the system[10].In the face of this more secretive and responsible attack mode,one must carry out an in-depth analysis,consider the attack strategy under the overall situation,and determine the cause-and-effect relationship between attacks,to defend against it.

    Since intrusion detection(ID)is the core element of network security,there are many complementary security devices widely deployed regarding various current security threats,such as an intrusion-detection system(IDS)and other preventive security mechanisms(such as access control,authentication,and firewalls).In this way,the availability,integrity,and confidentiality of computers and network services can be ensured[11].Deploying multiple security products at the same time can improve the threat-detection rate,but it can also produce many primitive low-level alarms,most of which are false positives,making it difficult to extract real attack information.The elimination of false positives is of great significance for improving research efficiency and enhancing its accuracy.

    From the above discussion,it is clear that there is a need for an efficient way to mine attack patterns from massive data and predict attacks.Hence,to address these issues,in this paper a multi-step attack-correlation and -detection method based on data mining and deep learning is proposed,aiming to eliminate false positives,analyze and mine attack scenes,and make predictions based on massive alarm data.

    The rest of this paper is organized as follows.In Section 2,the most relevant related work in this area is described.In Section 3,an overview of the problem statement is provided and the proposed approach described.The experiment and results are presented in Section 4.Section 5 provides conclusions and planned future work.

    2 Related Work

    Alarm correlation and detection have been studied extensively in recent decades.With the increasingly severe network security situation,related research content has become increasingly more extensive and in-depth.In this paper,the related research is classified into four categories.

    ?Similarity-based approaches relate attacks according to the similarity between various steps,based on the idea that similar alarms come from the unified attack scene[12].Therefore,the calculation method of similarity is the core of these approaches,making them different from the causal correlation approach that mainly concerns sequences’causal structure.Qiao et al.[13]proposed a concise formula to calculate the similarity between alarms in which double clustering is applied to extract alarm sequences using the longest common substring(LCS)algorithm.

    ?Causal-based approaches use the cause-and-effect relationship between alarm sequences as the critical factor to identify multi-step attacks.Two main methods exist in cause-andeffect correlation.The first method uses pre- and post-conditions.Pre-conditions refer to the conditions for the attack’s success and post-conditions to the possible impact after the attack.Ning[14]conducted a significant amount of research using this approach to reduce alarm attributes utilizing connection diagrams and deduce the relationship of alarms using predicate logic.The second method is statistical inference,which is used to find statistical regularities in the data set,which derives from the alarm sequence frequency.The Bayesian network and hidden Markov model(HMM)are popular implementations in probability statistics based on this method.Kavousi et al.[15]extracted the Bayesian-network graph with the help of the transfer probability of alarm sequence and reduced the graph’s scale by pruning.

    ?The structure-based approaches focus on the organization’s current network structure.In addition,the security monitoring system contains each node’s information and connection,especially the vulnerability of each node and the importance of the stored information.The main difference from the previous methods is that the structure-based approach builds the attack graph from the defensive side rather than from the attacker’s.Noel et al.[16]applied this approach to mine multi-step attacks for the first time in 2004.Luo et al.[17]proposed a virtual-game-corresponding algorithm based on a dynamic game tree and applied it to find multi-step attacks.

    ?The hybrid approach is primarily a combination of the previous approaches in different phases[7].Ramaki et al.[18]developed an RTECA framework that combines frequency analysis to build correlation matrices by the similarity of alarm attributes and matching of IP ports.His approach incorporated previous approaches and applied them to different stages according to their merits and demerits,achieving significant effectiveness improvements.Pajouh et al.[19]applied a two-tier classification module utilizing the naive Bayes and certainty factor versions of K-nearest neighbor to identify suspicious behaviors.

    Case-based,pattern-matching,network-structure,prerequisite,and post-condition methods all manually use rules constructed by security researchers to some extent.Therefore,they all share certain similarities and are prone to confusion.In the case-based approach,the attack model must be built separately for each scene.In a pattern-matching approach,a higher-level model must abstract from each scene.In the structure-based approach,model construction mainly depends on the importance of network structure and information.The possible invasion path is assumed from vulnerable nodes,not on the attacker’s actual behavior.The obvious advantage of these approaches based on manual rules is that they can significantly reduce false positives.However,when security experts pre-determine no rule,it cannot be effectively detected,and the scalability will be affected.

    Methods based on similarity,probability statistics,and machine learning differ from knowledge-based ones to a certain extent.These methods tend to mine the attack patterns in existing data.The similarity-based method uses unsupervised clustering to generate behavior sequences by defining different similarity functions.The method based on probability statistics uses the idea of Bayesian probability to construct a probability attack graph.The graph can represent the specific scene when the attack occurs with intuitive graphical results and can predict the attack scene.Machine-learning-based methods belong to supervised classification,and are mainly used to identify false positives and attack-chain threat degrees.They automatically extract features from the data and reduce the analysis work of security personnel.These methods rely on collected data,which means that the system faces a cold-start problem;that is,how it works when there is no data.Besides,there are some differences between automatic and manual detection in terms of accuracy and false positives.However,from the perspective of scalability in the face of new attacks,the former is better.

    Researchers are currently working towards the integration of artificial intelligence and rules[11,20].The combination saves a large amount of resources and improves the performance of the security system’s accuracy and usability.

    3 Proposed Solution

    Different kinds of security facilities are equipped on servers,network switches,and other devices.They filter traffic and trigger alarms based on rules.Then,data-processing platforms collect and standardize alarms.The mining of attack patterns from alarm sequences and prediction of attacks are the main goals of the proposed solution.

    As shown in the flow diagram(Fig.1),there are four pivotal components of the proposed framework alarm correlation,false-positive detection,attack-scene mining,and attack-scene prediction.After the standard alarm data’s initial processing,the alarm-correlation and false-alarm detection modules carry out the next level of clustering.These modules first remove redundancy through IP,port,alarm type,and so on to generate a meta-alarm,and then complete the alarm correlation using a streaming clustering algorithm.For alarm clustering,the feature-extraction module extracts the context features to identify false positives.The attack-scene mining module then extracts the frequent patterns from these data.It then calculates the transfer probability based on Bayesian theory and draws an attack graph to show the attack path.Finally,the prediction module segments the alarm sequence by way of the window and predicts the attack scene based on the training of word-vector embedding and LSTM.

    Figure 1:Flow diagram of alarm correlation and detection

    3.1 Alarm Correlation

    An alarm is the result of threat level obtained by rule matching of the IDS system for each packet,mainly including occurrence time,alarm type(action),alarm category(class),packet type(pack_type),source IP(src_ip),destination IP(dst_ip),source port(src_port),destination port(dst_port),and priority under IDS.The alarm-correlation algorithm deals with the alarm’s characteristics and internal relationship between them,which aggregates them into a relatively complete attack chain.

    IDS or NIDS creates raw alarms,and then standardized modules generate standard alarms with basic attributes,called raw alarmsA={a1,a2,a3,...,an}.When an alarm arrives,multiple IDSs may receive the same traffic and generate alarms with same contents.A host may issue many similar traffic packets with the same content and IP in a brief period.In this case,the generated alarms are redundant for subsequent analysis and must be merged to produce a meta-alarm,which is denoted MA={ma1,ma2,ma3,...,man}.The attributes contained in theith meta-alarmmaiare the same those contained in the standard alarm.Whilemaicontains all the information for the standard alarms,it is essentially a queue that holds the original alarms.According to the metaalarm concept,IP port and time are the critical characteristics.The algorithmic flow of metaalarm aggregation calculates whether the IP ports are the same and at intervals.If the alarmsaiandajbelong to the original alarm setA,then their source IP,source port,target IP,and target port are identical,and they satisfy the relationshipai.time?aj.time≤th.

    The meta-alarm aggregation algorithm uses a sliding time window.When the time difference between the timestamp of the newly arrived alarm and the earliest meta-alarm in the current time window is larger than the threshold,it is defined as a timeout.The meta-alarm cannot participate in the merge,so the time window slides backward until all meta-alarms in the event window are within the threshold range.Each alarm pairs with a meta-alarm,and if the port IP and alarm type are the same,it is merged with the meta-alarm,resulting in a final output of the meta-alarm setMA.

    The meta-alarm still has all the characteristics of all standard alarm formats.This process eliminates redundant data,avoids interference to the subsequent operation,and improves data quality.

    Alarm correlation is a clustering process that deals with alarms and their relationship to obtain attack chains.The CluStream algorithm,proposed by Aggarwal et al.[21],aims to accomplish clustering quickly while ensuring the accuracy of clustering,and is utilized to correlate alarms.The algorithm contains two processes:online and offline clustering.In the online phase,the goal is to quickly scan data streams and generate a micro-set,which refers to the set of onestep attacks.In the offline phase,the main idea is to detect the IP set of two single-step attacks and determine whether the alarm type conforms to the multi-step attacks’characteristics.

    The multi-step attack usually carries out a series of malicious behaviors with the jumpers’help,and the key to identifying the jumpers is whether there is an “end-to-end” IP set with each single-step attack.There are several points optimized for alarm correlation in this paper,as follows.

    ?Alarms’amount varies with time,so the number of clusters cannot be set directly.As the alarm streams increase,the number of micro-sets must be limited to control the calculation times of distance.The control method takes a boundary time to store the micro-collection and will not add new alarm data when timeout.

    ?CluStream uses a Pyramid timeframe structure to accelerate the query and a snapshot to store part of data instead of all data to reduce storage.In this case,each micro-set may not be retrieved and critical alarms may be omitted and cause correlation failures.To solve this problem and reduce the number of searches,in this paper a search strategy based on dichotomy is designed that takes the average triggering time of all alarms in a micro-set as its time and sorts each micro-set according to chronological order,which can be used with a binary strategy.

    ?The offline phase cluster micro-sets using the improved K-means algorithm depend on the pyramid timeframe structure’s snapshot.In this paper,the micro-set does not have snapshots,but directly stores according to the order of timestamps.Therefore,only data before the time-critical point are needed to search,and all the data after the critical point will be included in the clustering algorithm for correlation.

    After analyzing the CluStream algorithm flow and reforming,another core of the alarmcorrelation algorithm is to design an alarm-attribute similarity function.For any two alarms,a measure of their similarity must be calculated based on their attributes.For attribute similarity of ports,alarm types,and packet types,the similarity value is 1 if they are equal or 0 otherwise.The similarity value must be converted into a 34-bit binary number for attribute IP address and then the maximum matching length from high to low is calculated.The ratio of this length to 32 is the similarity of IP.

    For the attribute time,the closer the time,the greater the similarity.The characteristics of the time interval are different for different types of attacks.Therefore,a time-similarity formula based on the Sigmoid function is designed.αindicates the threshold at which the function falls andβthe fall rate.The specific formula is expressed as follows:

    Accordingly,the formula for calculating the similarity of two alarms is

    3.2 False-positive Detection

    The attack chain is generated from all alarms process by the alarm correlation,but there are some meaningless alarm sequences called false-alarm sequences.When an alarm exists alone,it is impossible to determine whether it is a false alarm based on its category,IP port,or other properties.For example,one intranet node B sends an ICMP message to another intranet node C,which is very common in intranet environments,and one usually has low awareness of this message.However,before this event,an external node A carried out an overflow attack on B through software vulnerability and successfully obtained the system permission of B.Then,node A controlled node B to detect all the machines in the internal segment using ICMP.At this point,the ICMP sent by B to C may become a link in the attacker’s behavior chain.Therefore,in this paper the characteristics that lead to false positives from the alarm set’s perspective are analyzed based on the attack-chain context.

    ?Attack duration.From the time an attacker launched the detection to reach the goal,the time interval is an attack duration.After the clustering completes,the alarms will sort based on the timestamp.As can be known from analysis of a multi-step attack,the attacker will look for the next opportunity to invade again after each step is complete.

    ?Attack interval.When an attacker penetrates step by step to find nodes with possible vulnerabilities,the attack interval is often long.In a one-step attack,the detection and scanning behaviors generally produce many alarms in a brief period.Therefore,the time interval between multiple steps and the time interval within a single step is considered a feature.

    ?Source of the attack.The source of network intrusion is bound to come from an external system.When some abnormal behavior of the internal nodes is found,it often implants malicious software.Therefore,finding a high-frequency external IP at the start of the attack chain is the key to mining the attack sequence.

    ?Sensitivity.The attacker’s target is the high-value data or important services within the network,so whether the nodes in the attack chain contain these targets is an important indicator with which to measure the sensitivity.

    ?Frequency of attack types.Most of the false positives in a network are generated by the regular service.With increasing time,the frequency will tend to be stable.However,the alarms generated by intrusion are uncommon,and the frequency of these false alarms is different from that of ordinary alarms.

    ?Number of actions in attack chain.In a network with a complex structure,it is difficult for an attacker to achieve the attack target directly.It may take several attempts to get close to the critical nodes,which means that the number of behaviors will also increase.

    ?Threat of external IP.All operations generated by a high-risk IP are suspect.Through monitoring some malicious IPs by security researchers,the determination of an IP’s threat can introduce external knowledge.A threat can also be defined as the number of alarms calculated from an IP history.

    ?Type of one-step attack.In the real attack scenes,many attackers will use a scanning method for detection.Then,they may use a DDOS to attack after finally finding the target node.Thus,the type of single-step attack should be taken into consideration.

    Based on the discussion above,in this paper LightGBM is used to determine whether an alarm sequence is a false positive.Let attack chainsi=m1,m2,m3,...,mnrepresent the multistep attack sequence,in which each step is a single-step attack.mi=a1,a2,a3,...,ancontains the underlying meta-alarm.For each alarm setsi,the formulations for calculating properties are shown in Tab.1.

    The feature operations of an alarm set depend on its internal statistical characteristics and global statistical information.With increasing alarms,the global statistics tend to be stable,and the changes in the distribution of data have a low impact on it,which is not conducive to reflecting the current network situation.Therefore,in this paper the time is restricted,the alarm data within one month are selected,and alarm-data updates are daily.

    3.3 Attack-Scene Mining

    Attack-scene mining extracts attack patterns from real alarm sequences for online detection and prediction.PrefixSpan[22]is commonly used in the production environment since it only must scan the database twice,and the projection database shrinks rapidly.It has more advantages in dense datasets,but there are still some shortcomings,as follows.

    ?The possibility of repeated projection increases with increasing data size,and the algorithm may establish multiple identical projection databases during scanning.In this paper,a hash table is used to store the scanned location to avoid this problem.As the scanning continues,the location information’s length will rapidly decrease,and the storage cost is much less than the scanning cost.

    ?One generated projection sequence is discarded directly and no longer mined when its length adds the current prefix length is less than the minimum control length.This is because the final output series’length will not exceed its projection sequence,in which case one must perform pruning.

    Table 1:Table of feature-calculation methods

    ?Every time a projected database is created,the sequence suffix must be fully copied,which incurs a significant amount of database overhead.Therefore,in this paper a position table is established instead of creating the projection database to avoid adding new storage space when scanning locations.

    ?The number of sequences in the projected database determines the calculation of the subsequent support degree.When the amount is less than the current support degree,subsequent mining will not generate a frequent sequence.Therefore,it will not create a projected database in this case.

    The improved algorithm flow is shown as Algorithm 1.

    Algorithm Input:pr 1:PosPrefixSpan(a,S,a_pos,pre_tree,minsup)efix a,project database(with prefix a) S|a,prefix tree pre_tree,minimum support minsup Output:frequent sequence A 1count_dict ←get_count(S|a)2for each a1 in count_dict do:3 if count(a1)>minsup:4 A.append(a1+a)5 End if 6 a1_pos ←get_prefixPos(S|a,a1)7 if a1_pos.len

    8 Continue 9 End if 10if a1_pos is in pos_list:11pre_tree[a1]←get_tree(pos_list,a1_pos)12End if 13PosPrefixSapn(a1,S,a1_pos,pre_tree[a1],minsup)14End for

    A hash structure and prefix tree structure based on location information are proposed herein to optimize the PrefixSpan algorithm.To reduce the construction of duplicate projection databases,the searched projection database’s location must be saved.When searching the same location again,recursion mining is not needed again.

    Fig.2 shows how to use the hash table and prefix tree.After mining sequencein the sequence database,the location information for the projected database generated byis recorded in the format “Sequence ID_prefix location &Sequence ID_ prefix location...” The primary key of the hash database is position information.To reduce its length,only sequences with a suffix length greater than 0 will be stored.After the storage is complete,the prefix tree must be built according to the mined prefix sequence.The former item is the parent node of the following item,and the child nodes are generated recursively based on subsequent mining results.At this time in the hash database,location information is the key,and the value is the leaf node corresponding to the projected database.Then,when finding the prefix,the location information corresponding to the projected database has been searched,the database is then directly interrogated,and the suffix will be connected.

    Figure 2:Hash table and prefix tree of improved PrefixSpan

    In the improved PrefixSpan algorithm,the output is an attack tree based on sequence construction.This is done for two reasons:First,in mining of the same projection database,the results are often the same,so the result of the previous mining can be used directly;that is,directly connect a node and its leaf nodes.Second,the attack tree is a more visual description of the attack path.After obtaining an attack tree with frequent sequences,each path from the root node to the child node is an attack chain.

    To better show the correlation between each attack,it is necessary to calculate the probability of state transition between attacks.The Markov theory,which can define the cause-and-effect correlation of alarm,is used to obtain the probability.A Markov chain represents the transition graph from one state to another.In this model,the sum of the transition probability of each state should be 1.The Markov model is forward-oriented,which means the next state only depends on the value of the previous one,as in the following equation:

    The transition matrix of the attack graph is calculated by counting the occurrence times of each alarm.For the two nodes connected in the alarm chainaiandaj,the transition probability is

    Online detection uses the LCS method to compare the real-time online aggregated alarm sequence with the attack-pattern string.If the similarity is greater than the threshold value,it is considered an attack chain with high risk.

    3.4 Attack-scene Prediction

    After the above-described processing,the alarm sequence still has many properties,such as alarm type,IP and port,and time.However,in the alarm-sequence prediction,the target predicted is the attacker’s next action.Therefore,only the alarm-type sequence is taken as the training data.The names of alarms are all strings that must be digitized.The digitization method encodes the alarm name and labels into integer numbers.After the encoding is complete,the next task is sequence-length processing.The data that the prediction model can receive are all of the same length,but the length is uneven for the real alarm sequence,so the sequence lengthLis defined as the length of the training data.Then,a sliding time window is used to obtain the training sequence of equal length,as shown in Fig.3.

    The length of the sliding window isL,each slide takesLas the training set,and theL+1 data are used as the label to generate data pairs.For sequences with a length less thanL,0 will be added in the header.

    In this paper,LSTM,the most typical model in RNNs,is selected as the sequence prediction model.As shown in Fig.4,the prediction network structure contains three layers:an embedding,LSTM,and dense layer.

    Embedding layer.The input data are labeled sequence number of the alarm name,and the role of the embedding layer is to re-encode the alarm name and transform it into a vector.The similarity between vectors determines the similarity between words,indicating the connection between alarms.

    LSTM layer.The LSTM layer is the core module for learning the features of an alarm sequence.Through the transfer of its cell state,the LSTM layer preserves its transfer probability and finds the correlation before and after an alarm more accurately to complete the alarm-sequence prediction.

    Dense layer.Also known as the full connection layer,the dense layer combines the features extracted by the LSTM layer.It outputs the probability of each tag through the activation function.

    The final outputs are the next alarm probabilities,among which the alarm with the maximum probability is the prediction result.

    Figure 3:Sequence-cutting process

    Figure 4:Prediction-network structure

    4 Experimental Results

    DARPA2000 and ISCX2012 were used in the present work as multi-step attack datasets and Snort 2.9 was employed to replay traffic with rule snortrules-snapshot-29130 since these datasets are raw traffic packets.In this section,the experimental results are described and analyzed according to the following flow:alarm correlation,false-positive detection,attack-scene mining,and attack-scene prediction.

    4.1 Alarm Correlation

    Two results are combined in the alarm-correlation step.One is an alarm set used to calculate the features for false-positive detection that also contains detailed information such as time and IP.The other are the alarm sequences for frequent sequence mining.In this process,one can preliminarily find some attack steps,such as the sample attack procedures shown in Fig.5.

    Figure 5:Sample attack process on DARPA dataset

    4.2 False-positive Detection

    In the false-positive-detection step,LightGBM is used to determine false positives of alarm sets;four other algorithms were chosen for comparison.The results on two datasets(DARPA and ISCX)are shown as Tabs.2 and 3,respectively.

    Table 2:Comparison of algorithms on DARPA dataset

    It can be seen that the performance of LightGBM is the best among the five models compared,and has a high false-alarm recognition rate.Overall accuracy is approximately 98% in the DARPA dataset and approximately 95.5% in the ISCX dataset.

    Table 3:Comparison of algorithms on ISCX dataset

    Since the false-alarm detection described in this paper is trained based on the alarm context,the study of Yao et al.[23]was selected for comparison based on a single-alarm feature-clustering model.The comparison results are shown in the Tab.4.

    Table 4:False-positive detection comparison

    4.3 Attack-scene Mining

    In the attack-scene-mining step,the goal is to find frequent sequences on the correlated alarms and extract the attack pattern.In this paper,the attack-scene-mining algorithm is implemented by optimizing PrefixSpan.Experiments were carried out based on four different attributes.The selected dataset is from the IBM Quest Synthetic Data Generator(https://sourceforge.net/projects/ibmquestdatagen/)program.

    Fig.6 shows a comparison between the improved and original algorithms.The factors that affect algorithm performance include the degree of support,number of data rows,average sequence length,and number of item sets.The runtimes of the two algorithms are very close when the conditions are loose.However,as the conditions become stricter or the amount of data becomes larger,the improved algorithm becomes increasingly faster than the original.

    It is necessary to count the occurrence times and transition probability based on Bayesian theory for each alarm.The attack-scene-mining results are in the form of alarm chains.Owing to the large number of alarm types,only some primary state-transition diagrams were selected in this experiment.Fig.7 is a probability attack diagram for the DARPA dataset.

    Each node in the figure represents a type of attack,the arrow direction indicates the attack order,and the value on the arrow indicates the transition probability from one to another.A DDOS attack on a target is depicted,as can be seen from the transition process with the help of a jump board through one-step detection.

    Figure 6:Algorithm performance comparison under different conditions(a)Under different support levels(b)Under different row numbers(c)Under different sequence lengths(d)Under different item categories

    Figure 7:Schematic of attack process on DARPA dataset

    4.4 Attack-scene Prediction

    In the final step,attack-scene prediction,attack patterns from scene mining were used as training data for LSTM.Since the sequence set length is mostly between 0 and 10,the intercepted window length was set to 5.Besides,if the sequence length is less than 5,0 is added to the header.In this experiment,70% of the data were randomly selected as the training set and 30% as the verification set.The accuracy rate is then calculated for different sequence lengths.Owing to the different number of steps,the prior knowledge given will vary,and the accuracy of the prediction is slightly different.Fig.8 shows the main results.

    Figure 8:Attack-scene-prediction results on two different datasets(a)Prediction result with DARPA dataset(b)Prediction result with ISCX dataset

    The figure shows the accuracy of four different algorithms under a different number of attack steps.It is clear that when there is only one alarm,it is difficult to determine what the next attack step is.With the gradual increase and completeness of the attack,the prediction accuracy also increases gradually,finally reaching an accuracy rate of 98%.LSTM + CNN also presented a good effect,but compared with LSTM alone,the model is much more complex and its accuracy is not qualitatively improved.Therefore,the LSTM algorithm was selected.

    Perry et al.[24]also used LSTM to predict attacks from alarm data with single-layer LSTM,without an embedding method.For comparison,in the present work 80% was selected as the test set and 20% as the validation set for training.The average accuracy rate in prediction instead of the accuracy rate for each step was then calculated.

    As the results show in Tabs.5,the method presented in this paper exhibits good performance on the two datasets,reaching an average accuracy of 85.3% on DARPA and 82.5% on ISCX.

    Table 5:Attack-scene prediction comparison

    5 Conclusion

    In this paper,the problem of multi-step attacks hidden in massive alarm data is studied,and a method proposed for alarm correlation,revealing attack patterns,and the online prediction of attacks,thus providing an effective way to protect network systems from multi-step attacks.By improving and optimizing the key algorithms for the steps of alarm correlation,false-alarm detection,attack-scene mining,and attack-scene prediction,the proposed method exhibits good performance and accuracy.This study has some limitations,and planned future work includes exploring ways to reduce the impact of alarm misses and to optimize those multi-step attacks with particularly long time spans.

    Funding Statement:This work is supported by the National Key R&D Program of China(2016QY05X1000)and the National Natural Science Foundation of China(Grant No.201561402137).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    婷婷亚洲欧美| 女人高潮潮喷娇喘18禁视频| 中文资源天堂在线| 国产精品香港三级国产av潘金莲| 动漫黄色视频在线观看| 欧美+日韩+精品| 午夜日韩欧美国产| 老熟妇乱子伦视频在线观看| 麻豆久久精品国产亚洲av| 中文在线观看免费www的网站| 精品久久久久久久久久久久久| 欧美国产日韩亚洲一区| a级一级毛片免费在线观看| 亚洲欧美日韩高清专用| avwww免费| 久久精品国产自在天天线| 国产欧美日韩一区二区三| 国产成人福利小说| 免费搜索国产男女视频| 精品欧美国产一区二区三| 亚洲五月婷婷丁香| 欧美xxxx黑人xx丫x性爽| 在线观看日韩欧美| 国产97色在线日韩免费| 在线播放国产精品三级| 国产亚洲精品综合一区在线观看| 老熟妇乱子伦视频在线观看| 老司机深夜福利视频在线观看| 免费av不卡在线播放| 亚洲国产欧美网| 欧美日韩精品网址| 久久欧美精品欧美久久欧美| 国产精品久久久久久精品电影| 国产av不卡久久| 啦啦啦免费观看视频1| 国产三级中文精品| 国产精品久久久久久亚洲av鲁大| 老汉色∧v一级毛片| 国产真实伦视频高清在线观看 | 麻豆国产av国片精品| 中文字幕精品亚洲无线码一区| 欧美一级毛片孕妇| 精品久久久久久久久久免费视频| 久久精品国产亚洲av涩爱 | 欧美一级毛片孕妇| 久久久久久久久中文| 变态另类成人亚洲欧美熟女| 成人国产一区最新在线观看| 欧美午夜高清在线| 老汉色av国产亚洲站长工具| 国产精品久久久久久精品电影| 色综合站精品国产| 日韩欧美三级三区| 精品电影一区二区在线| 亚洲精品日韩av片在线观看 | 国产av一区在线观看免费| 在线观看美女被高潮喷水网站 | 精品久久久久久久久久免费视频| 九色国产91popny在线| 好看av亚洲va欧美ⅴa在| 国产探花在线观看一区二区| av福利片在线观看| 搡老岳熟女国产| 19禁男女啪啪无遮挡网站| 亚洲av熟女| 欧美成狂野欧美在线观看| 久久久国产成人精品二区| 亚洲国产色片| 国产精品嫩草影院av在线观看 | 久久婷婷人人爽人人干人人爱| 99热只有精品国产| 天天躁日日操中文字幕| 性欧美人与动物交配| 色视频www国产| 最近最新中文字幕大全电影3| 中文字幕高清在线视频| 国产亚洲精品综合一区在线观看| 三级国产精品欧美在线观看| 国产99白浆流出| www日本黄色视频网| 变态另类丝袜制服| 18美女黄网站色大片免费观看| 变态另类丝袜制服| 中国美女看黄片| 欧美中文日本在线观看视频| 免费av观看视频| 国产老妇女一区| av天堂在线播放| 91字幕亚洲| 97超视频在线观看视频| 久久天躁狠狠躁夜夜2o2o| 免费在线观看成人毛片| 啦啦啦韩国在线观看视频| 久久久精品大字幕| 免费无遮挡裸体视频| 日本五十路高清| 亚洲熟妇中文字幕五十中出| 午夜福利视频1000在线观看| 国产精华一区二区三区| 天堂√8在线中文| 国产精品女同一区二区软件 | 日韩人妻高清精品专区| 日韩欧美一区二区三区在线观看| 国产精品精品国产色婷婷| 男人的好看免费观看在线视频| 麻豆国产av国片精品| 久久伊人香网站| a在线观看视频网站| 国产成人av教育| 日本与韩国留学比较| 老司机福利观看| 欧美另类亚洲清纯唯美| 欧美中文日本在线观看视频| 亚洲最大成人手机在线| 国产精品久久视频播放| 最近最新免费中文字幕在线| 丰满的人妻完整版| 亚洲精品日韩av片在线观看 | 午夜日韩欧美国产| 在线观看66精品国产| 亚洲精品一区av在线观看| 欧美日本亚洲视频在线播放| 中文字幕人妻丝袜一区二区| 午夜免费观看网址| 噜噜噜噜噜久久久久久91| 国产亚洲精品久久久com| 成人亚洲精品av一区二区| 久久久久免费精品人妻一区二区| 老汉色∧v一级毛片| 在线免费观看的www视频| 国产精品久久久久久人妻精品电影| 欧美色欧美亚洲另类二区| 99久国产av精品| 午夜日韩欧美国产| 国产三级在线视频| 色综合站精品国产| 国产精品美女特级片免费视频播放器| 国产成人欧美在线观看| 99精品在免费线老司机午夜| 国内少妇人妻偷人精品xxx网站| 久久精品国产清高在天天线| 午夜老司机福利剧场| 老司机福利观看| 黑人欧美特级aaaaaa片| 在线a可以看的网站| av国产免费在线观看| av在线天堂中文字幕| 麻豆国产av国片精品| 两个人看的免费小视频| 午夜福利在线观看免费完整高清在 | 亚洲片人在线观看| 中亚洲国语对白在线视频| 狂野欧美激情性xxxx| 免费av观看视频| 欧美精品啪啪一区二区三区| 国产一区在线观看成人免费| 亚洲精品影视一区二区三区av| 国产单亲对白刺激| 色老头精品视频在线观看| 婷婷精品国产亚洲av在线| 国产精品三级大全| 国产日本99.免费观看| 99精品在免费线老司机午夜| 成人国产一区最新在线观看| 五月玫瑰六月丁香| 一级作爱视频免费观看| 亚洲av中文字字幕乱码综合| 欧美+亚洲+日韩+国产| АⅤ资源中文在线天堂| 99在线视频只有这里精品首页| 两个人看的免费小视频| 精品电影一区二区在线| 亚洲av日韩精品久久久久久密| 午夜老司机福利剧场| www.熟女人妻精品国产| av中文乱码字幕在线| 久久久久久久精品吃奶| 天堂av国产一区二区熟女人妻| 无遮挡黄片免费观看| 亚洲aⅴ乱码一区二区在线播放| 久久久久国内视频| 女人被狂操c到高潮| 免费在线观看成人毛片| 一本精品99久久精品77| 国产av在哪里看| 色播亚洲综合网| 脱女人内裤的视频| 久久亚洲精品不卡| 日本黄色片子视频| 色哟哟哟哟哟哟| 乱人视频在线观看| xxx96com| 美女免费视频网站| 欧美日韩福利视频一区二区| 日本熟妇午夜| 色综合站精品国产| 国产成人a区在线观看| 久久欧美精品欧美久久欧美| 亚洲五月婷婷丁香| 香蕉久久夜色| 亚洲激情在线av| 三级毛片av免费| 亚洲av二区三区四区| 国产精品三级大全| 日本一本二区三区精品| 日本 av在线| 国产美女午夜福利| 亚洲成av人片在线播放无| 久久精品国产清高在天天线| 99久久精品国产亚洲精品| 黄色成人免费大全| 少妇裸体淫交视频免费看高清| 级片在线观看| 色噜噜av男人的天堂激情| 欧美日韩一级在线毛片| 日本熟妇午夜| 18禁黄网站禁片免费观看直播| 哪里可以看免费的av片| 俄罗斯特黄特色一大片| 在线观看免费午夜福利视频| 精品久久久久久久久久免费视频| 一区二区三区高清视频在线| 亚洲国产欧美人成| 欧美乱妇无乱码| 亚洲精品乱码久久久v下载方式 | 神马国产精品三级电影在线观看| 久久久久久久午夜电影| 精品乱码久久久久久99久播| 精品一区二区三区av网在线观看| 超碰av人人做人人爽久久 | 国产成人欧美在线观看| 欧美日韩国产亚洲二区| 三级国产精品欧美在线观看| 欧美+亚洲+日韩+国产| 欧美一区二区国产精品久久精品| 久99久视频精品免费| 啦啦啦韩国在线观看视频| 12—13女人毛片做爰片一| 哪里可以看免费的av片| 国产欧美日韩一区二区精品| 免费看日本二区| 高清在线国产一区| 99久久九九国产精品国产免费| av欧美777| 两个人视频免费观看高清| 久久草成人影院| 久久久久久久久中文| 少妇丰满av| 男人的好看免费观看在线视频| 一个人看视频在线观看www免费 | 亚洲欧美日韩东京热| 香蕉av资源在线| 狂野欧美激情性xxxx| 久久久久久九九精品二区国产| 欧美黑人巨大hd| 午夜日韩欧美国产| 国产三级黄色录像| 亚洲欧美日韩高清在线视频| 日韩欧美一区二区三区在线观看| 亚洲av电影不卡..在线观看| 又粗又爽又猛毛片免费看| 日韩欧美精品免费久久 | 欧美在线黄色| 免费在线观看成人毛片| 不卡一级毛片| 天天躁日日操中文字幕| 岛国在线观看网站| 亚洲av一区综合| 精品国内亚洲2022精品成人| 国产主播在线观看一区二区| 亚洲精品456在线播放app | 欧美日韩黄片免| 男女视频在线观看网站免费| 国产伦一二天堂av在线观看| 成年女人永久免费观看视频| 亚洲av成人精品一区久久| 最新中文字幕久久久久| 欧美丝袜亚洲另类 | 欧美乱色亚洲激情| 热99在线观看视频| 色精品久久人妻99蜜桃| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 好男人在线观看高清免费视频| 法律面前人人平等表现在哪些方面| 色老头精品视频在线观看| 搡女人真爽免费视频火全软件 | 最近在线观看免费完整版| 国产精品一区二区三区四区免费观看 | 国产又黄又爽又无遮挡在线| 精品国产三级普通话版| 欧美日韩福利视频一区二区| 欧美最黄视频在线播放免费| 动漫黄色视频在线观看| 少妇的逼好多水| 免费观看的影片在线观看| 欧美一级毛片孕妇| 亚洲av二区三区四区| 香蕉av资源在线| 亚洲人成电影免费在线| 身体一侧抽搐| 国产亚洲av嫩草精品影院| 少妇高潮的动态图| 欧美在线一区亚洲| 日本熟妇午夜| 日本a在线网址| 一区二区三区国产精品乱码| 亚洲精品国产精品久久久不卡| 真实男女啪啪啪动态图| 色吧在线观看| av黄色大香蕉| 久久久成人免费电影| 成人亚洲精品av一区二区| 色在线成人网| 两人在一起打扑克的视频| 内射极品少妇av片p| www.www免费av| 亚洲激情在线av| 在线观看美女被高潮喷水网站 | 久久精品国产自在天天线| 99国产精品一区二区蜜桃av| 国产69精品久久久久777片| 国产激情偷乱视频一区二区| 亚洲电影在线观看av| АⅤ资源中文在线天堂| 免费在线观看亚洲国产| 国产亚洲精品一区二区www| av国产免费在线观看| 99riav亚洲国产免费| 免费观看精品视频网站| 日韩欧美国产一区二区入口| 叶爱在线成人免费视频播放| 高清在线国产一区| 91久久精品电影网| 麻豆国产av国片精品| 亚洲精品在线美女| 一本久久中文字幕| 精品一区二区三区视频在线观看免费| 午夜免费激情av| 国产黄片美女视频| 日本 欧美在线| 白带黄色成豆腐渣| 国产精品久久视频播放| 国产亚洲精品久久久久久毛片| 色精品久久人妻99蜜桃| 国产视频一区二区在线看| 天天躁日日操中文字幕| 又紧又爽又黄一区二区| 午夜老司机福利剧场| 在线a可以看的网站| 亚洲五月天丁香| 国产毛片a区久久久久| 18禁美女被吸乳视频| 91九色精品人成在线观看| 一个人免费在线观看的高清视频| 国产熟女xx| 极品教师在线免费播放| 一个人看视频在线观看www免费 | av天堂中文字幕网| 18美女黄网站色大片免费观看| 婷婷精品国产亚洲av| 国产精品久久久久久人妻精品电影| 日韩精品中文字幕看吧| 欧美成人a在线观看| 国语自产精品视频在线第100页| 日韩av在线大香蕉| 国产探花极品一区二区| 长腿黑丝高跟| 特大巨黑吊av在线直播| h日本视频在线播放| 十八禁网站免费在线| 精品日产1卡2卡| 我的老师免费观看完整版| 18禁美女被吸乳视频| 99精品在免费线老司机午夜| 亚洲成人精品中文字幕电影| 一个人观看的视频www高清免费观看| 中文在线观看免费www的网站| 久久精品人妻少妇| 桃红色精品国产亚洲av| 成人永久免费在线观看视频| 变态另类丝袜制服| 亚洲不卡免费看| 国产爱豆传媒在线观看| 免费人成视频x8x8入口观看| 免费人成在线观看视频色| 国产爱豆传媒在线观看| 亚洲18禁久久av| 可以在线观看的亚洲视频| 757午夜福利合集在线观看| 精品国产美女av久久久久小说| 日韩av在线大香蕉| 亚洲人成网站高清观看| 无遮挡黄片免费观看| 国产亚洲av嫩草精品影院| 一个人看视频在线观看www免费 | 欧美另类亚洲清纯唯美| 国产爱豆传媒在线观看| 啪啪无遮挡十八禁网站| 精品久久久久久久人妻蜜臀av| 免费看a级黄色片| 禁无遮挡网站| 天天一区二区日本电影三级| 丰满的人妻完整版| 亚洲一区高清亚洲精品| 悠悠久久av| 在线观看午夜福利视频| 在线十欧美十亚洲十日本专区| 日本a在线网址| 老司机在亚洲福利影院| 青草久久国产| 亚洲精品亚洲一区二区| 免费看日本二区| 在线观看一区二区三区| 亚洲天堂国产精品一区在线| 床上黄色一级片| 亚洲av中文字字幕乱码综合| 欧美日韩乱码在线| 黄色成人免费大全| 日韩亚洲欧美综合| 日韩精品青青久久久久久| 午夜激情欧美在线| av国产免费在线观看| 亚洲精品乱码久久久v下载方式 | 日韩欧美在线乱码| 欧美成人性av电影在线观看| 精品福利观看| 美女cb高潮喷水在线观看| 99久久久亚洲精品蜜臀av| 国产精品嫩草影院av在线观看 | 亚洲av中文字字幕乱码综合| 午夜福利免费观看在线| 免费看光身美女| 色播亚洲综合网| 色老头精品视频在线观看| 老鸭窝网址在线观看| 亚洲av二区三区四区| 国产精品久久视频播放| 亚洲成人久久性| 无人区码免费观看不卡| 国产真实伦视频高清在线观看 | 亚洲av一区综合| 好男人电影高清在线观看| 极品教师在线免费播放| 啦啦啦观看免费观看视频高清| 搡女人真爽免费视频火全软件 | aaaaa片日本免费| 国产探花极品一区二区| 一个人免费在线观看的高清视频| 成人一区二区视频在线观看| 亚洲av美国av| 级片在线观看| 国产高清激情床上av| 国产精品久久久久久久久免 | 成人永久免费在线观看视频| 18禁国产床啪视频网站| 村上凉子中文字幕在线| 一本久久中文字幕| 免费av观看视频| 欧美黑人欧美精品刺激| 亚洲精品456在线播放app | 18禁黄网站禁片午夜丰满| 一本综合久久免费| 国产一区二区亚洲精品在线观看| 真实男女啪啪啪动态图| 亚洲精品成人久久久久久| 亚洲成人久久爱视频| 在线观看免费视频日本深夜| 狠狠狠狠99中文字幕| 国产成+人综合+亚洲专区| 国产精品爽爽va在线观看网站| 看免费av毛片| 欧美bdsm另类| 久久草成人影院| 无遮挡黄片免费观看| 成年免费大片在线观看| 国产精品影院久久| 精品熟女少妇八av免费久了| 每晚都被弄得嗷嗷叫到高潮| 欧美色视频一区免费| 亚洲av五月六月丁香网| 91在线精品国自产拍蜜月 | АⅤ资源中文在线天堂| 欧美一级a爱片免费观看看| 国产欧美日韩一区二区三| 可以在线观看毛片的网站| 少妇裸体淫交视频免费看高清| 三级男女做爰猛烈吃奶摸视频| 国模一区二区三区四区视频| 91久久精品电影网| 色综合欧美亚洲国产小说| 岛国视频午夜一区免费看| 18+在线观看网站| 亚洲七黄色美女视频| 一区二区三区激情视频| 欧美色欧美亚洲另类二区| 国产高清激情床上av| 精品国内亚洲2022精品成人| 亚洲七黄色美女视频| 动漫黄色视频在线观看| 欧美3d第一页| 日韩欧美三级三区| 香蕉久久夜色| 男人的好看免费观看在线视频| 日韩欧美国产一区二区入口| 欧美国产日韩亚洲一区| 成人特级av手机在线观看| 亚洲最大成人中文| 1024手机看黄色片| 亚洲精品成人久久久久久| 国产在线精品亚洲第一网站| 乱人视频在线观看| 女同久久另类99精品国产91| 在线看三级毛片| 国产精品久久久久久精品电影| 一级毛片高清免费大全| 国产精品 国内视频| 免费在线观看影片大全网站| 又爽又黄无遮挡网站| 99热只有精品国产| 欧美+日韩+精品| 午夜老司机福利剧场| 国产精品久久久久久亚洲av鲁大| 国产精品永久免费网站| 噜噜噜噜噜久久久久久91| av天堂中文字幕网| 中文字幕精品亚洲无线码一区| 日本 av在线| 丁香六月欧美| 天天躁日日操中文字幕| 又粗又爽又猛毛片免费看| 亚洲精品乱码久久久v下载方式 | 国产伦在线观看视频一区| 桃红色精品国产亚洲av| 亚洲成人精品中文字幕电影| 天堂影院成人在线观看| 宅男免费午夜| 久久久精品大字幕| 一二三四社区在线视频社区8| 黑人欧美特级aaaaaa片| 亚洲av免费在线观看| 淫妇啪啪啪对白视频| 国产三级黄色录像| 香蕉久久夜色| 国产精品爽爽va在线观看网站| 九色国产91popny在线| 亚洲av免费在线观看| 免费看日本二区| 亚洲精品亚洲一区二区| 免费在线观看亚洲国产| 婷婷精品国产亚洲av在线| 两人在一起打扑克的视频| 亚洲欧美日韩无卡精品| 午夜福利成人在线免费观看| 99久久精品热视频| 国产 一区 欧美 日韩| 欧美黑人欧美精品刺激| 国产欧美日韩精品一区二区| 一个人免费在线观看的高清视频| 欧美日韩国产亚洲二区| 一夜夜www| 亚洲av五月六月丁香网| 久久久久国内视频| 日本黄大片高清| 国产成人av教育| 成人三级黄色视频| 久久伊人香网站| 国产91精品成人一区二区三区| 亚洲人成网站高清观看| 国产三级黄色录像| 9191精品国产免费久久| 国产精品自产拍在线观看55亚洲| 国产探花极品一区二区| 国产精品久久视频播放| 亚洲成人久久性| 蜜桃久久精品国产亚洲av| 噜噜噜噜噜久久久久久91| 亚洲电影在线观看av| 午夜精品在线福利| 最新中文字幕久久久久| 99久久99久久久精品蜜桃| 桃红色精品国产亚洲av| 3wmmmm亚洲av在线观看| 少妇的逼水好多| 黄片大片在线免费观看| 亚洲国产精品sss在线观看| 中出人妻视频一区二区| 国产一区二区亚洲精品在线观看| 小说图片视频综合网站| www国产在线视频色| 久久香蕉国产精品| 在线观看免费视频日本深夜| 中出人妻视频一区二区| 久久久久久久午夜电影| 一区二区三区激情视频| 欧美日韩亚洲国产一区二区在线观看| 露出奶头的视频| 精品国产超薄肉色丝袜足j| 欧美极品一区二区三区四区| 国产亚洲欧美在线一区二区| 变态另类成人亚洲欧美熟女| 国产精品亚洲av一区麻豆| 亚洲精品国产精品久久久不卡| 国产老妇女一区| 99久国产av精品| 久久久久久大精品| 亚洲 欧美 日韩 在线 免费| 老司机福利观看| 国产一区二区三区在线臀色熟女| 全区人妻精品视频| 午夜福利成人在线免费观看| 久久久精品欧美日韩精品| 三级国产精品欧美在线观看| 丰满人妻熟妇乱又伦精品不卡| 18禁在线播放成人免费| 一进一出抽搐gif免费好疼|