• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    ICMPTend:Internet Control Message Protocol Covert Tunnel Attack Intent Detector

    2022-08-24 03:26:34TengfeiTuWeiYinHuaZhangXingyuZengXiaoxiangDengYuchenZhouandXuLiu
    Computers Materials&Continua 2022年5期

    Tengfei Tu,Wei Yin,Hua Zhang,*,Xingyu Zeng,Xiaoxiang Deng,Yuchen Zhou and Xu Liu

    1State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing,100876,China

    2State Key Laboratory of Cryptology,Beijing,100878,China

    3National Computer Network Emergency Response Technical Team/Coordination Center of China,100029,China

    4Pennsylvania State University,State College,16801,USA

    Abstract:The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not easy to be discovered.Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions.In this paper,we propose an ICMP covert tunnel attack intent detection framework ICMPTend,which includes five steps:data collection,feature dictionary construction,data preprocessing, model construction, and attack intent prediction.ICMPTend can detect a variety of attack intentions,such as shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attacks.We extract features from five types of attack intent found in ICMP channels.We build a multi-dimensional dictionary of malicious features,including shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attack keywords.For the high-dimensional and independent characteristics of ICMP traffic,we use a support vector machine(SVM)as a multi-class classifier.The experimental results show that the average accuracy of ICMPTend is 92%,training ICMPTend only takes 55 s,and the prediction time is only 2 s,which can effectively identify the attack intention of ICMP.

    Keywords: Internet control message protocol; support vector machine;covert tunnel; network analysis

    1 Introduction

    Internet Control Message Protocol (ICMP) covert tunnel is used to transmitting special information to processes or users prevented from accessing the information.It is more hidden and more difficult to detect than malware traffic.The purpose of using covert channels is to send data in the network while ensuring that the sending is unnoticed by a third party and without alerting any firewalls or Intrusion Detection Systems (IDS) on the network.Studies have shown that a large website may have 26 gigabyte (GB) of information illegally stolen by covert tunnels in a year, assuming that an ICMP packet only carries 1 bit of data [1–3].

    Several researchers have oriented their research axes to detect covert channel attacks using multiple methods and techniques.Currently, covert tunnel detection is mainly studied in terms of both traffic behavior and signature.

    The detection method based on traffic behavior uses behavior characteristics such as the maximum, minimum, average time interval, message size, and the ratio of the number of request and response messages within a specified time window as the detection basis.This method takes all traffic within a specified time window as a detection object, and can only determine whether a covert tunnel has been established at both ends of the communication within a certain time window, and cannot locate specific malicious traffic [4–8].On the other hand, the data features containing specific attack commands are not extracted to clarify the specific attack intent of the covert tunnel.All these have brought inconvenience to security personnel in taking targeted defensive measures [9–12].In order to determine the attacking intent of the covert tunnel more accurately, it is necessary to analyze the detection of the ICMP covert channel from the perspective of data.

    Signature-based detection [12,13] detects attacks by detecting signatures in the data part of the ICMP traffic.It does not detect unknown attacks, and its generalization ability is weak.For example, the ICMP covert tunnel tool icmptunnel [14] generates covert tunnel traffic containing the keyword “TUNL” by default, so the way to detect such covert tunnels is to identify the signature of “TUNL”, but when the attacker deliberately modifies the keyword or does not use the keyword, the detection is invalid.Because signature-based detection relies on expert knowledge to extract keywords and perform strict matching.

    Through the analysis of a large number of ICMP covert tunnel traffic, we found that ICMP covert tunnel traffic has obvious and specific attack intentions in the data part, such as shell attacks, access to sensitive directories and other illegal behaviors.Corresponding shell commands,sensitive directories, communication protocol keywords, tunnel reserved words, and common network attack keywords often appear in the data part of the malicious traffic of ICMP covert tunnel.For example, the Hypertext Transfer Protocol (HTTP) keyword “www”, the sensitive directory “User” in the Windows operating system, the reserved word “TUNL” in the tunnel tool ptunnel, the shell command “docker pull nginx; /bin/sh shell.sh”.With these types of keywords as features, the attack intention of the covert tunnel can be effectively detected, and targeted defensive measures can be taken.

    A large number of studies have proved that machine learning methods have good generalization in traffic detection.Among them, SVM [15] is a classification model that shows many unique features in solving small and medium-sized data samples, non-linear and high-dimensional pattern recognition.It solves the problem of linearly indistinguishable data sets by mapping linearly indistinguishable data to a high-dimensional feature space through a kernel function.It divides the data set by a hyperplane related to only a small number of support vectors, so it requires only a small amount of data to build a model and is insensitive to noisy data.The flow of ICMP covert tunnels happens to be high-dimensional, linearly indistinguishable, and there are a lot of noise data, so we believe that the SVM model is an effective solution for ICMP covert tunnel detection.

    In this paper, we propose ICMPTend, an ICMP covert tunnel attack detector, by extracting the corresponding keyword features for common ICMP covert tunnel attack intent and using SVM as a classifier algorithm.

    In summary, we make the following contributions in this paper:

    ·We propose a systematic ICMP covert tunnel attack intent detection framework ICMPTend,which consists of five steps:data collection, feature lexicon construction, data preprocessing,model construction, and attack intent prediction.It can detect a variety of attack intentions,such as shell attacks, sensitive directory access, communication protocol traffic stealing,filling tunnel reserved words, and other common network attacks.

    ·We build a multi-dimensional malicious feature lexicon containing keywords for shell attacks, sensitive directory access, communication protocol traffic theft, filling tunnel reserved words, and other common network attacks.

    ·The experimental results show that the average accuracy of ICMPTend reaches 92%, the training time is only 55 s, and the prediction time is only 2 s, which can effectively identify the attacking intention of ICMP.

    2 Preliminaries

    With the rapid development and progress of network technology, our daily work is increasingly dependent on the network.While network technology brings us convenience, it also brings hidden security threats.Many researchers have begun to study the application of artificial intelligence technology in network attack detection [16] and intrusion detection system construction [17].As a typical network attack method, the ICMP covert channel has attracted the attention of network attackers and security researchers.At present, common network attack detection methods are based on behavior statistics and signature-based methods.

    In the detection method based on statistical behavior, [18] counted 12 behavioral characteristics of covert tunnels by analyzing data characteristic information such as packet size, tunnel traffic type, and fixed format of data, and established an SVM machine learning model to detect covert tunnels.In [19], authors established an information entropy-based detection model by calculating the confusion level of the data portion of ICMP.Reference [20] synthesized the criteria and behavior of ICMP to build an efficient tunnel detection system for ICMP.However, there are two problems with the above studies:first, hackers can bypass this detection method by imitating the communication behavior of normal ICMP traffic; second, only the signature left by the tunnel tool is used for the data part of ICMP containing malicious data without extracting the data features containing specific attack commands, which cannot clearly conceal the specific attack intent of the tunnel.All these bring inconvenience to security personnel to take targeted defense measures.In order to determine the attacking intent of the covert tunnel more accurately, the detection of ICMP covert tunnels needs to be analyzed from the perspective of data.

    In signature-based detection methods, the main focus is to match the data part with a specific signature.Some covert tunnel tools generate traffic with distinct signatures, e.g., icmptunnel generates tunnel traffic with the signature string “TUNL”.Some ICMP covert channels will also be used to transmit the content of other protocols, such as HTTP and Domain Network System(DNS).Keywords “TUNL”, “http://” and “DNS” can be used as typical signature features.There are two problems with detection based on data signatures:first, it needs to accumulate signatures continuously, unable detect unknown attacks, and its generalization ability is weak; second, the detection unit of this method is a single traffic flow, and it cannot detect context-sensitive covert tunnel which splits payload into multiple traffic for delivery.

    Symbols used in this paper and their meanings are shown in the following Tab.1.

    Table 1:Symbols table

    3 Detection Framework

    The detection framework of ICMPTend is shown in Fig.1, which is divided into two phases:training and prediction.The training phase includes four steps:data acquisition, feature database construction, data preprocessing and model construction.The data in the prediction phase is predicted using the trained model after data preprocessing.

    3.1 Training Phase

    Step IData Acquisition:An extensive collection of five types of malicious samples including shell attacks, accessing sensitive directories, stealing communication protocol traffic, filling tunnel reserved words, and common network attacks, and using 0–5 tags to indicate classification methods, such as obtaining them from websites such as GitHub to build concealment tunnel sandbox,etc.

    Step IIFeature Database Construction:Collect feature words from the perspectives of shell commands, sensitive directories, communication protocol keywords, tunnel reserved words, and common network attack keywords, and build a characteristic database.

    Step IIIData Preprocessing:After three steps of hexadecimal decoding, common encryption method decoding, and text feature representation, the original ICMP hexadecimal is converted into a tensor that the model can learn.

    Step IVModel Construction:Construction of ICMPTend covert tunnel detection model base on SVM classifier.

    Figure 1:Framework of ICMPTend

    3.2 Prediction Phase

    Step VConvert the data part of the ICMP traffic to be detected into a tensor that can represent features as model inputs.After theStep VIdetection phase, the output of the model is a label, which can indicate the specific attack intention of the hidden tunnel or confirm that there is no covert tunnel.

    4 Implementation

    4.1 Data Acquisition

    Extracting features from the perspective of specific attack intentions of ICMP covert tunnels to identify hidden tunnels is essentially a multi-classification task of ICMP hidden tunnels based on attack intentions.In this paper, we mainly consider a large number of attack intents in covert tunnels, such as shell attacks, access to sensitive directories, stealing communication protocol traffic, filling tunnel reserved words, and common network attacks.There are five types of specific attack intentions.The benign samples come from normal ICMP traffic in the campus network of Beijing University of Posts and Telecommunications (BUPT), with a total of 1,000; the malicious samples come from the following sources:

    (1) Sample ICMP tunnel traffic collected from sites such as GitHub, counting 442 entries.

    (2) Rules and other ICMP covert tunnel detection models judged as malicious, and manually sampled and labeled malicious traffic in the campus network, totaling 659 items.

    (3) The malicious traffic was constructed and communicated using ICMP covert tunnel tools such as icmptunnel, ptunnel, and icmpsh, and then crawled using Wireshark, counting 3,361 entries.

    A total of 4,462 malicious samples with malicious attack intent were obtained, and the number of samples with specific attack intent of 5 types is shown in Tab.2.The samples are divided into the training set and testing set in the ratio of 7:3 for experiment.

    Table 2:Five types of specific attack intent and sample data distribution

    4.2 Feature Database Construction

    Feature words are mainly composed of letters, numbers and special symbols, and different feature databases have different construction methods.Some commercial software constructs feature databases by directly querying the feature signature of malware [6].In [18], the feature databases were constructed by directly cutting words.In our paper, we found that ICMP covert tunnel traffic has obvious and specific attack intentions in the data part, such as SHELL_ATTACKS,ACCESS_SENSITIVE_DIRS, etc.In order to extract keywords that can represent these attack intents, corresponding to the above attack intents, feature keywords from the perspective of shell commands, sensitive directories and their operations, communication protocols and related information, tunnel reserved words and common network attacks.The database is constructed as follows:

    (1) SHELL_ATTACKS keywords:Shell attacks are essentially composed of various shell commands, and shell commands are divided into built-in commands and external commands.Therefore, this paper combines the malicious samples in the training set to collects 78 keywords of built-in shell commands and 33 common keywords.There are 111 external commands, such as the built-in command keyword “kill” for forcibly terminating the startup process and the external command keyword “sh” for starting a shell script, which constitute the keyword set for shell attacks.

    (2) ACCESS_SENSITIVE_DIRS keywords:When hackers enter sensitive directories, they may add, delete, change, check, copy, upload and download files in sensitive directories.Therefore, this article combines the malicious samples in the training set to collect 241 common sensitive directories, sensitive file names, and keywords for sensitive file operations in Linux and Windows operating systems, such as sensitive directories “etc”and “bin”in Linux.And the keyword “read()” for Python functions used to read and write the contents of a file.For example, the sensitive directories “etc” and “bin” in Linux, and the keywords “read()”and “write” of the Python function used to read and write the contents of files are used to construct the keyword set for sensitive directory access.

    (3) STEAL_PROTOCOLS keywords:After some ICMP covert tunnels are established, traffic from the controlled side using any communication protocol will be sent to the control side through the covert tunnel.In this paper, we combine the malicious samples in the training set to collect the names of common communication protocols and a total of 86 keywords related to each communication protocol, such as “http://” involving HTTP protocol, “www.”, “.com” and “.cn” etc.are used to construct a keyword set for the theft of communication protocol traffic.

    (4) FILL_RESERVED_WORDS keywords:Some ICMP covert tunnel tools [19,20] and some hackers deliberately fill in some reserved words in ICMP covert tunnel traffic as their identities.In this paper, we collect 76 reserved words, such as “TUNL”, “tun0”and “signature”from the malicious samples in the training set, and build the tunnel reserved word keyword word set.

    (5) COMMON_CYBER_ATTACKS keywords:After the ICMP covert tunnels are established,some attackers send common network scripts such as SQL injection, command execution,cross-site scripting attacks to the controlled end through the covert tunnel, and the controlled end launches corresponding attacks on the target server, thus evading the security personnel’s tracking by means of this intermediate bridge.In this paper, we collect a total of 150 common network attack keywords with malicious samples in the training set, such as “select”, “union” and “from” frequently used in SQL injection, and “<script>”, “alert”and “<img>”, frequently used in cross-site scripting attacks.

    The final set of these five types of keywords are combined into a feature database (FD)containing 637 unique feature words.The composition and description of the feature database are shown in Tab.3.

    Table 3:Composition and instances of feature database

    4.3 Data Preprocessing

    Data preprocessing is the process of converting the hexadecimal data of ICMP data part into tensors that can be recognized by the machine learning model after hexadecimal decoding, string decoding, and text feature representation.The specific process is as follows:

    Step 1:Hexadecimal Decode

    The data field of the original ICMP traffic stores data in the form of a hexadecimal stream.In order to extract the text features of the transmitted content, the hexadecimal data needs to be decoded.The decoding function is shown in Eq.(1).

    As shown in Fig.2, the ICMP covert tunnel is to transmit a shell attack statement-“docker pull nginx; L2Jpbi9zaCBzaGVsbC5zaA==”, but the actual after hexadecimal encoding, what is passed is “646f636b6572......”, where “docker” is encoded as “646f636b6572”, “pull” is encoded as “707566c6c”, and “nginx” is encoded as “6e67696e78”.Both the training model and the prediction stage need to encode the ICMP data.

    Step 2:String Decode

    With the continuous development of various encryption technologies, attackers use Uniform Resource Locator (URL) encoding [21], BASE64 encoding [22] and other encoding methods [23]to encode attack traffic to evade the detection of security detection system and thus hide their information.Attack intent, normal URL decoding and BASE64 decoding of text can effectively restore the original traffic and improve the detection efficiency.The decoding function is shown in Eq.(2).

    Figure 2:The instance of ICMP covert tunnel traffic before and after decoding

    As shown in Fig.3, the hexadecimal decoded text “docker pull nginx; L2Jpbi9zaCBzaGVsbC5 zaA ==” is decoded by BASE64 and becomes “docker pull nginx; /bin/sh shell.sh”, the key part of the shell attack “/bin/sh shell.sh” is restored.

    Figure 3:The instances of the traffic before and after BASE64 decoding

    Step 3:Text Feature Representation

    In this paper, we use word frequency-inverse document frequency (TF-IDF) [24] for text feature representation, through which the text content can be converted into a feature-representing tensor, which can be input into the model for learning.TF-IDF is a statistical method used to evaluate the importance of a word to a sample in the training set.The core idea is that the importance of a word increases in proportion to the number of times it appears in the sample,but it is not in the sample.The number of occurrences is inversely proportional to the frequency in the training set.The algorithm flow of text feature representation is as follows.The text feature representation of the example ICMP covert tunnel traffic is shown in Fig.4.

    1) Each word in the FD is numbered, which corresponds to the index in the feature vector with a latitude size of,fori=0,1,...,m(637 in this paper).

    2) Initialize a vector for each ICMP trafficTj

    viin Eq.(3) represents the mapping of the corresponding numbered words in the feature database.The corresponding TF-IDF value is then calculated for this flow.

    Figure 4:The instances of textual feature representation of ICMP covert tunnel traffic

    4.4 Model Construction

    In order to clarify the specific attack intentions of ICMP covert tunnel, ICMP traffic flow needs to be classified into multiple categories.There are six categories of multi-classification,namely, normal traffic, shell attack, sensitive directory access, communication protocol traffic stealing, filling tunnel reserved words, and common network attacks as shown in the aforementioned Tab.1.ICMPTend model construction process is shown in Fig.5, which is divided into two phases:training and testing.In the training phase, the input is pre-labeled benign and malicious sample data in the training set, and the output is a multi-class model with attack intention prediction capabilities.In the prediction phase, the input is the actual data part of the unlabeled ICMP traffic, and the output is the possible attack intent of the traffic.The purpose is to obtain a multi-classification model ICMPTend, which can predict the attack intention of ICMP traffic in real situations.

    ICMPTend uses SVM as the classification algorithm.SVM has maintained its unique advantage in solving classification problems for small and medium samples, high-dimensional, and linearly indistinguishable datasets.The ICMP covert tunnel dataset constructed in this paper happens to be small-sample, high-dimensional, and linearly indistinguishable, so theoretically SVM is suitable for the situation in this paper.

    The ICMPTend receives the data part of ICMP traffic as input, and outputs the label of the category to which the traffic belongs.The label corresponds to the specific attack intent.Suppose the training set contains the data part of ICMP traffic.{(d1,y1),(d2,y2),...,(dT,yT)},dt(t=1,2,...,T) denotes the data portion of a flow.yt∈{0,1,...,5}indicates the label of ICMP traffic, 0 to 5 indicate normal traffic class, shell attack class, sensitive directory access class, communication protocol traffic stealing class, filling tunnel reserved word class, and common network attack class, respectively.The model first needs to obtain the feature representation of the data part, i.e.,dt→vt,vt∈Rn.Next, a classification function needs to be fitted, assuming that the predicted label is.Then=f(vt) gives the result that the data portion of an ICMP traffic is predicted to be a certain class.P (=f(vt)),t=0,1,...,5 indicates the probability that the data part is predicted to be a certain category, Finally, the prediction label corresponding tomax(P (=f(vt))),t=0,1,...,5 is selected as the final prediction output,which corresponds to the specific covert tunnel attack intent.During training, the model needs to minimize the loss functionover the entire training set, and L denotes the function that calculates the loss in case of classification errors.

    Figure 5:ICMPTend model architecture diagram

    5 Evaluation

    In order to verify the effectiveness and practicability of the database-based SVM covert tunnel attack intent detection model proposed in this article, this section answers the following four questions through related experiments:

    Question 1(Q1):Are the features constructed in this article effective?

    Question 2(Q2):Is it appropriate to choose SVM as a classifier?

    Question 3 (Q3):What are the advantages of building a feature lexicon based on specific attack intent?

    Question 4(Q4):Compared with the anomaly detection capabilities of two categories,is the attack intent detection of multiple categories acceptable?

    The software environment used in this paper is Python 3.7, Scikit-Learn 0.21.3, Wireshark 3.2.7.0,the operating system is Ubuntu 16.04,and the hardware environment is Intel(R) Core(TM)i7-8550U @ 1.80 GHz central processing unit (CPU), 8 GB random-access memory (RAM).The goal of this article is to measure the effectiveness of the model, which is essentially a standard multi-class model.Therefore, precision, recall, F1 score, accuracy and macro average are used as evaluation indicators to evaluate the experimental results of the multi-class model.This is shown in the following Tab.4.

    Table 4:Evaluation indicators and their meaning

    5.1 Answer to Q1 and Q2

    In order to answer Q1 and Q2, we build a feature dictionary based on the attack intent of shell attacks, access to sensitive directories, stealing communication protocol traffic, filling tunnel reserved words, and common network attacks, and construct feature vectors based on the feature dictionary as input to the model.In order to verify the effectiveness of the feature construction method in this paper, the feature vector is input into a separate model for training and prediction,and the effectiveness of the detection is evaluated.

    The results of the comparison experiments using SVM, logistic regression (LR), and Naive Bayesian (NB) models are shown in Tab.5.It can be found that inputting the feature vectors constructed by the feature construction method in this paper into multiple models for testing has achieved good results in terms of accuracy, recall, F1 score, and accuracy.Even in the NB model,which has the worst combined effect, the precision, recall, F1 score and accuracy reach at least 0.86, 0.80, 0.83, and 0.89, respectively.This indicates that the method of constructing features in this paper is effective.

    Table 5:Evaluation result metrics

    Comparing the detection effect of the SVM model with that of the LR and NB models, the SVM model is also superior to other models in all aspects.This show that the SVM model is more appropriate in discerning the specific attack intent of the covert tunnel.The feature construction method in this paper is effective and SVM can be used as a classifier for covert tunnel specific attack intent detection [26,27].

    Observation 1:(1) The keywords of shell attacks, access to sensitive directories, stealing communication protocol traffic, filling tunnel reserved words, and common network attacks are often found in the data portion of malicious traffic in ICMP covert tunnels, so extracting these types of keywords to construct features would be effective; (2) The SVM is suitable for highdimensional, linearly indistinguishable data, and ICMP traffic happens to be high-dimensional and linearly indistinguishable, so SVM is more appropriate than other machine learning models.

    5.2 Answer to Q3

    The general method of using keywords for classification in machine learning is to use the collection of all words in the training set after sample word separation to form a vocabulary to form a large-dimensional vocabulary, which often requires further dimensionality reduction.In order to verify the effectiveness of this dimensionality reduction method, a comparative experiment before and after dimensionality reduction was constructed.The pre-dimensionalization experiment is to split the data part of each traffic in the training set with spaces and special symbols, and use the set of all words obtained after splitting as a feature dictionary, which contains about 30,000 words.The dimensionality reduction experiment adopts the feature dictionary construction method of this article.The other experimental steps are the same.

    As shown in Tab.6, after dimensionality reduction, the precision, recall, and F1 scores of each category are higher than those before dimensionality reduction by at least 0.02, 0.01, and 0.02, the accuracy rate is improved by 0.05, and the training time after dimensionality reduction is also reduced to about 1/8 of that before dimensionality reduction.This show that the dimensionality reduction method used in this paper is effective, not only improves the training speed, but also improves the evaluation indicators of each category.Before and after dimensionality reduction,the accuracy rate can be improved, and the time efficiency can be significantly improved.

    In terms of CPU resource consumption, as shown in Fig.6, after dimensionality reduction,the CPU usage during training is significantly lower than before.Only a single core is required to meet the training requirements, while before dimensionality reduction, an eight-core CPU is required to meet the training requirements.This shows that the dimensionality reduction method used in this paper can effectively reduce the consumption of CPU resources.

    In terms of memory resource consumption, as shown in Fig.7, the memory utilization during training after dimensionality reduction is 45.4% lower than that before dimensionality reduction.This shows that the dimensionality reduction method used in this paper can make more effective use of memory resources.

    Table 6:Comparative experimental results before and after dimensionality reduction

    Table 6:Continued

    Figure 6:CPU utilization during training

    Figure 7:Memory utilization during training

    Observation 2:Using the feature lexicon constructed in this paper, the dimension of the final feature vector is reduced from more than 30,000 to 637 compared to the dictionary constructed after direct word segmentation.Therefore, dimensionality reduction can undoubtedly improve the efficiency of the model.At the same time, choosing an appropriate dimensionality reduction method can filter out noise or irrelevant information, thereby helping the model to better learn the main features, and the model can obtain better detection results.

    5.3 Answer to Q4

    In order to clarify the gap of detection capability between attack intention detection based on multi classification and anomaly detection based on binary classification, we aggregate all types of malicious samples into malicious samples, and conducts anomaly detection experiments based on two classifications.And compare the results of the anomaly detection experiment with the results of the attack intention detection experiment.

    The experimental results are shown in Tab.7.The macro-average accuracy, macro-average recall, and accuracy of attack intent detection based on multi-classification are 0.05, 0.06, and 0.05 lower than that of anomaly detection based on two-classification, and the gap is controlled within 0.1.At the same time, the lowest accuracy rate and the lowest recall rate in the multi-classification also reached 0.89 and 0.86 respectively, achieving a better multi-classification effect.

    Table 7:Comparison experiments of multi-classification-based attack intent detection and binary classification-based anomaly detection

    Observation 3:Compared with anomaly detection based on binary classification, attack intention detection based on multi-classification has better detection capabilities.

    6 Conclusion

    This paper uses ICMP data as the starting point to extract malicious attack intention keywords from five perspectives:shell commands, sensitive directories, communication protocol keywords, tunnel reserved words, and common network attack keywords, and build an ICMPTend detection model.Compared with the use of dictionary suffix cutting to construct feature vectors,it reduces noise interference and greatly reduces the dimensionality of feature vectors, which can clarify the attack intention of malicious traffic contained in the data part.

    Funding Statement:This research was supported by National Natural Science Foundation of China(Grant Nos.61972048, 62072051).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久99久视频精品免费| 99久久成人亚洲精品观看| 免费人成视频x8x8入口观看| 黄片wwwwww| 精品人妻一区二区三区麻豆| 中文字幕精品亚洲无线码一区| 亚洲一级一片aⅴ在线观看| 亚洲第一区二区三区不卡| 在线国产一区二区在线| 三级毛片av免费| 久久欧美精品欧美久久欧美| 人妻制服诱惑在线中文字幕| 91aial.com中文字幕在线观看| 看黄色毛片网站| 成熟少妇高潮喷水视频| 国产精品久久久久久精品电影小说 | 免费一级毛片在线播放高清视频| 别揉我奶头 嗯啊视频| 中文字幕精品亚洲无线码一区| 久99久视频精品免费| 听说在线观看完整版免费高清| 亚洲精品亚洲一区二区| 欧美三级亚洲精品| 欧美+日韩+精品| 日本三级黄在线观看| 美女 人体艺术 gogo| 久久韩国三级中文字幕| 波多野结衣高清作品| 国产极品天堂在线| 国产伦一二天堂av在线观看| 在线播放国产精品三级| 桃色一区二区三区在线观看| 久久精品国产清高在天天线| 日本成人三级电影网站| 别揉我奶头 嗯啊视频| 人妻系列 视频| 麻豆国产av国片精品| 女人十人毛片免费观看3o分钟| 亚洲真实伦在线观看| 美女被艹到高潮喷水动态| 插阴视频在线观看视频| 亚洲精品色激情综合| 色噜噜av男人的天堂激情| 午夜福利在线在线| 亚洲人成网站在线播放欧美日韩| 亚洲,欧美,日韩| 国产激情偷乱视频一区二区| 尤物成人国产欧美一区二区三区| 能在线免费看毛片的网站| 久久精品综合一区二区三区| 99热网站在线观看| 亚洲自拍偷在线| 国产精品一区二区性色av| 亚洲成av人片在线播放无| 又爽又黄a免费视频| 成人鲁丝片一二三区免费| 国产淫片久久久久久久久| 好男人视频免费观看在线| 最近视频中文字幕2019在线8| 婷婷色综合大香蕉| 看免费成人av毛片| 九九在线视频观看精品| 国产午夜精品论理片| 尾随美女入室| 精品久久久久久久人妻蜜臀av| 99久国产av精品| 在线免费观看不下载黄p国产| 国产精品,欧美在线| 国产一级毛片七仙女欲春2| 乱码一卡2卡4卡精品| 18禁裸乳无遮挡免费网站照片| 国产一区二区激情短视频| 国产精品一及| 蜜臀久久99精品久久宅男| 免费观看在线日韩| 国产精品一区二区在线观看99 | 亚洲成a人片在线一区二区| 成人午夜高清在线视频| 国产成人精品婷婷| 亚洲欧美精品专区久久| 国内精品美女久久久久久| 色综合色国产| 成人一区二区视频在线观看| 国产精品久久久久久久久免| 校园人妻丝袜中文字幕| 波多野结衣高清无吗| 日本熟妇午夜| 国产在线精品亚洲第一网站| 久久精品夜色国产| 麻豆成人午夜福利视频| 毛片女人毛片| 18禁在线无遮挡免费观看视频| 久久综合国产亚洲精品| 亚洲内射少妇av| 又粗又硬又长又爽又黄的视频 | 黄色视频,在线免费观看| 午夜a级毛片| 亚洲成人精品中文字幕电影| 日本免费一区二区三区高清不卡| 九九在线视频观看精品| 亚洲欧美日韩东京热| 久久久久久久久中文| 久久人妻av系列| 成熟少妇高潮喷水视频| 国产成人精品一,二区 | 国产精品一二三区在线看| 男人的好看免费观看在线视频| 午夜亚洲福利在线播放| 最近中文字幕高清免费大全6| 久久久成人免费电影| 在线天堂最新版资源| 国产在线精品亚洲第一网站| 蜜桃亚洲精品一区二区三区| 国产精品久久视频播放| 一个人观看的视频www高清免费观看| 少妇裸体淫交视频免费看高清| 岛国在线免费视频观看| 亚洲av熟女| 一夜夜www| 欧美日韩乱码在线| 欧美成人a在线观看| a级毛片免费高清观看在线播放| 国产精品免费一区二区三区在线| 五月伊人婷婷丁香| 久久99精品国语久久久| 国产精品无大码| 身体一侧抽搐| 久久精品人妻少妇| 国产爱豆传媒在线观看| 在线a可以看的网站| 色综合色国产| 久久久久久久久久久免费av| 国产女主播在线喷水免费视频网站 | 日韩欧美国产在线观看| 亚洲精品乱码久久久v下载方式| 美女 人体艺术 gogo| 久久久色成人| 欧美zozozo另类| 国产精品久久久久久av不卡| 男插女下体视频免费在线播放| 一本久久中文字幕| 国产成人影院久久av| 午夜精品在线福利| 欧美xxxx性猛交bbbb| 国产69精品久久久久777片| 如何舔出高潮| 精品久久久噜噜| 日韩大尺度精品在线看网址| 色尼玛亚洲综合影院| 人妻久久中文字幕网| 国产精品1区2区在线观看.| 国产精品麻豆人妻色哟哟久久 | 一个人看的www免费观看视频| 久久久欧美国产精品| 午夜免费男女啪啪视频观看| 亚洲三级黄色毛片| 精品久久久久久久久久免费视频| 在线播放国产精品三级| 亚洲精品乱码久久久v下载方式| 校园春色视频在线观看| 精品日产1卡2卡| 观看免费一级毛片| 青春草视频在线免费观看| 91狼人影院| 国产精品一区二区在线观看99 | 久久精品国产自在天天线| 日韩欧美一区二区三区在线观看| 波多野结衣高清作品| 美女xxoo啪啪120秒动态图| 性插视频无遮挡在线免费观看| 亚洲国产色片| 亚洲成a人片在线一区二区| 欧美丝袜亚洲另类| 婷婷色av中文字幕| 久久久国产成人精品二区| 亚洲成av人片在线播放无| 搞女人的毛片| 欧美日韩综合久久久久久| 国产探花极品一区二区| 成人亚洲欧美一区二区av| 女同久久另类99精品国产91| 亚洲成人av在线免费| 亚洲中文字幕日韩| 亚洲精品乱码久久久久久按摩| 成人毛片60女人毛片免费| 亚洲精品久久久久久婷婷小说 | 国产精品伦人一区二区| 国产v大片淫在线免费观看| 99久久成人亚洲精品观看| 男女那种视频在线观看| 真实男女啪啪啪动态图| 久久久久久久久久久丰满| 黄色欧美视频在线观看| 久久久欧美国产精品| 国产精品一区二区三区四区免费观看| 色综合色国产| 欧美一区二区精品小视频在线| 12—13女人毛片做爰片一| 国产成人一区二区在线| 丝袜喷水一区| 老司机福利观看| 久久人人爽人人片av| av女优亚洲男人天堂| 日本欧美国产在线视频| 亚洲av第一区精品v没综合| 国产av麻豆久久久久久久| 亚洲精华国产精华液的使用体验 | .国产精品久久| 天天躁夜夜躁狠狠久久av| 久久精品国产自在天天线| 变态另类丝袜制服| 少妇裸体淫交视频免费看高清| 男女视频在线观看网站免费| 99久国产av精品国产电影| 国产日本99.免费观看| 成人亚洲精品av一区二区| 蜜桃亚洲精品一区二区三区| 久久久a久久爽久久v久久| 中文字幕久久专区| 国产成人a区在线观看| 中出人妻视频一区二区| 国产三级中文精品| 亚洲精品色激情综合| 69人妻影院| a级毛色黄片| 欧美最黄视频在线播放免费| 不卡视频在线观看欧美| 日本黄色视频三级网站网址| 男女做爰动态图高潮gif福利片| 色综合站精品国产| 久久久国产成人免费| 久久久精品大字幕| 欧美最新免费一区二区三区| www日本黄色视频网| 日本爱情动作片www.在线观看| 国产视频内射| 网址你懂的国产日韩在线| 国产一区二区在线av高清观看| 91精品国产九色| 我的老师免费观看完整版| 免费观看人在逋| 国产视频内射| 欧美激情国产日韩精品一区| 夜夜看夜夜爽夜夜摸| 国产私拍福利视频在线观看| 欧美激情在线99| 国产精品久久久久久久久免| 久久亚洲国产成人精品v| 一卡2卡三卡四卡精品乱码亚洲| 日日摸夜夜添夜夜添av毛片| 亚洲真实伦在线观看| 免费电影在线观看免费观看| 99riav亚洲国产免费| 亚洲不卡免费看| 日本成人三级电影网站| 日日撸夜夜添| 99riav亚洲国产免费| 老师上课跳d突然被开到最大视频| 三级男女做爰猛烈吃奶摸视频| 国产成人91sexporn| 亚洲aⅴ乱码一区二区在线播放| 欧美高清性xxxxhd video| 又粗又爽又猛毛片免费看| 一边摸一边抽搐一进一小说| 亚洲最大成人中文| 深爱激情五月婷婷| 国产午夜精品一二区理论片| 久久精品影院6| 国产精品久久电影中文字幕| av天堂在线播放| 午夜福利视频1000在线观看| 波野结衣二区三区在线| 一区二区三区四区激情视频 | 亚洲av.av天堂| 夜夜夜夜夜久久久久| 国产精品一区二区性色av| 卡戴珊不雅视频在线播放| 国产在线男女| 精品久久久久久久久av| 国产高清三级在线| 在线观看一区二区三区| 免费看日本二区| 九九在线视频观看精品| 亚洲国产欧美人成| 成人二区视频| 欧美激情久久久久久爽电影| 99国产极品粉嫩在线观看| 天堂√8在线中文| 国产成人aa在线观看| a级一级毛片免费在线观看| 成人毛片60女人毛片免费| 日本与韩国留学比较| 色吧在线观看| 亚洲欧美日韩卡通动漫| 欧美极品一区二区三区四区| 久久久精品大字幕| 国产精品国产高清国产av| 波多野结衣高清无吗| 日韩欧美三级三区| 欧美成人a在线观看| 国产麻豆成人av免费视频| 国产又黄又爽又无遮挡在线| 国内精品一区二区在线观看| 黄片无遮挡物在线观看| 长腿黑丝高跟| 少妇人妻精品综合一区二区 | 老师上课跳d突然被开到最大视频| 日本熟妇午夜| 亚洲国产精品sss在线观看| 综合色丁香网| 国产日本99.免费观看| 精品久久久久久久久久免费视频| 欧美区成人在线视频| 草草在线视频免费看| 嫩草影院新地址| 久久人人爽人人片av| 成人午夜精彩视频在线观看| 网址你懂的国产日韩在线| 成人毛片60女人毛片免费| 亚洲欧美日韩无卡精品| 最近视频中文字幕2019在线8| 少妇熟女欧美另类| 一级毛片aaaaaa免费看小| av天堂中文字幕网| 在线观看一区二区三区| 精品久久久久久久久av| 最近的中文字幕免费完整| 精品久久久久久久久久免费视频| 在线天堂最新版资源| 91麻豆精品激情在线观看国产| 国产精品久久视频播放| 嘟嘟电影网在线观看| 内射极品少妇av片p| 久久人人精品亚洲av| 久久久久久大精品| 午夜激情欧美在线| 国产成人a区在线观看| 亚洲第一区二区三区不卡| 亚洲自偷自拍三级| 亚洲va在线va天堂va国产| 真实男女啪啪啪动态图| 成人亚洲欧美一区二区av| 国产精品一及| 亚洲精品国产av成人精品| 中文在线观看免费www的网站| 日本成人三级电影网站| 久久精品夜夜夜夜夜久久蜜豆| 亚洲av第一区精品v没综合| 成年免费大片在线观看| 国产午夜精品一二区理论片| 22中文网久久字幕| 久久人人爽人人爽人人片va| 亚洲av免费高清在线观看| 老师上课跳d突然被开到最大视频| 亚洲色图av天堂| 一区福利在线观看| av视频在线观看入口| 色视频www国产| 亚洲国产日韩欧美精品在线观看| 又粗又爽又猛毛片免费看| 有码 亚洲区| 秋霞在线观看毛片| 亚洲人成网站在线观看播放| 蜜臀久久99精品久久宅男| 嫩草影院精品99| 热99re8久久精品国产| 又爽又黄a免费视频| 欧美日韩综合久久久久久| 国产精品久久久久久精品电影| 欧美xxxx黑人xx丫x性爽| 久久久久久久久久久丰满| 九九在线视频观看精品| 国产成年人精品一区二区| 成人二区视频| 国产精品.久久久| 国产精品免费一区二区三区在线| 久久久国产成人免费| 可以在线观看毛片的网站| 国产精品福利在线免费观看| av视频在线观看入口| 别揉我奶头 嗯啊视频| 夜夜爽天天搞| 亚洲av不卡在线观看| 波野结衣二区三区在线| 哪里可以看免费的av片| 午夜老司机福利剧场| 日韩视频在线欧美| 不卡一级毛片| АⅤ资源中文在线天堂| 性插视频无遮挡在线免费观看| 亚洲国产精品久久男人天堂| 欧美最新免费一区二区三区| 国产蜜桃级精品一区二区三区| 在现免费观看毛片| 可以在线观看毛片的网站| 国产午夜精品久久久久久一区二区三区| 春色校园在线视频观看| 欧美激情国产日韩精品一区| 亚洲av免费在线观看| 麻豆精品久久久久久蜜桃| 久久精品91蜜桃| 女人十人毛片免费观看3o分钟| 日本一本二区三区精品| 精品人妻偷拍中文字幕| 能在线免费看毛片的网站| 国产午夜精品一二区理论片| 最新中文字幕久久久久| 好男人在线观看高清免费视频| 日韩成人伦理影院| 亚洲av男天堂| 一级av片app| 亚洲人成网站在线播放欧美日韩| 乱人视频在线观看| 亚洲在线自拍视频| 九草在线视频观看| www.色视频.com| 亚洲四区av| 亚洲av中文字字幕乱码综合| 日韩中字成人| 久久午夜福利片| 国产精品野战在线观看| 最好的美女福利视频网| 天天躁日日操中文字幕| 免费黄网站久久成人精品| 寂寞人妻少妇视频99o| 久久久精品欧美日韩精品| 成年av动漫网址| 国产一级毛片七仙女欲春2| 日本爱情动作片www.在线观看| 日本三级黄在线观看| 欧美日韩综合久久久久久| 亚洲国产欧美人成| 国产一级毛片在线| 成人亚洲欧美一区二区av| 国产一区二区在线av高清观看| 免费看日本二区| 九九在线视频观看精品| 国产精品女同一区二区软件| 国产大屁股一区二区在线视频| 人妻夜夜爽99麻豆av| 午夜亚洲福利在线播放| 真实男女啪啪啪动态图| 亚洲真实伦在线观看| 精品久久久久久久末码| 国产精品电影一区二区三区| 在线观看一区二区三区| 三级毛片av免费| 日本黄色视频三级网站网址| av视频在线观看入口| 欧美区成人在线视频| 人体艺术视频欧美日本| 国产国拍精品亚洲av在线观看| 桃色一区二区三区在线观看| 白带黄色成豆腐渣| 又粗又硬又长又爽又黄的视频 | 国产精品美女特级片免费视频播放器| 成人永久免费在线观看视频| 日韩制服骚丝袜av| 可以在线观看的亚洲视频| 日本熟妇午夜| 丰满乱子伦码专区| 亚洲久久久久久中文字幕| 成人毛片a级毛片在线播放| 最近中文字幕高清免费大全6| 久久久久久久亚洲中文字幕| 久久99蜜桃精品久久| 亚洲五月天丁香| 国产探花在线观看一区二区| 热99在线观看视频| 国产老妇伦熟女老妇高清| 国产精品乱码一区二三区的特点| 国产精品久久久久久精品电影| 国产美女午夜福利| 国内精品一区二区在线观看| 中文精品一卡2卡3卡4更新| 中文字幕免费在线视频6| av天堂在线播放| 久久午夜亚洲精品久久| 成人永久免费在线观看视频| 日韩欧美三级三区| 桃色一区二区三区在线观看| 一级黄色大片毛片| or卡值多少钱| 日韩视频在线欧美| 搡女人真爽免费视频火全软件| 亚洲欧美中文字幕日韩二区| 插逼视频在线观看| 国产精品精品国产色婷婷| 99热这里只有精品一区| 国产三级在线视频| av女优亚洲男人天堂| 成人亚洲欧美一区二区av| 一个人免费在线观看电影| 联通29元200g的流量卡| 久久精品国产清高在天天线| 九九爱精品视频在线观看| 国产亚洲5aaaaa淫片| 可以在线观看的亚洲视频| 两个人的视频大全免费| 国产精品久久久久久av不卡| 赤兔流量卡办理| 看非洲黑人一级黄片| 国产日本99.免费观看| 日本黄大片高清| 一本久久精品| 高清午夜精品一区二区三区 | 国产在视频线在精品| 亚洲精品日韩av片在线观看| 干丝袜人妻中文字幕| 亚洲激情五月婷婷啪啪| 午夜福利视频1000在线观看| 久久久久国产网址| 九九热线精品视视频播放| 国产久久久一区二区三区| 乱码一卡2卡4卡精品| 亚洲av电影不卡..在线观看| 大型黄色视频在线免费观看| 精品一区二区三区视频在线| 人妻夜夜爽99麻豆av| 日韩欧美精品免费久久| 网址你懂的国产日韩在线| 日韩av在线大香蕉| 国产午夜精品论理片| 99在线人妻在线中文字幕| 99久久人妻综合| 亚洲精品久久久久久婷婷小说 | 波多野结衣高清无吗| 国产片特级美女逼逼视频| 午夜福利在线观看免费完整高清在 | 久久久久九九精品影院| 日本熟妇午夜| 成人特级av手机在线观看| 久久久久久久久中文| 久久久久久久午夜电影| 国产激情偷乱视频一区二区| 九九热线精品视视频播放| 免费av观看视频| 我要搜黄色片| 亚洲最大成人中文| 色播亚洲综合网| av天堂中文字幕网| 日本一二三区视频观看| 国产成人精品久久久久久| 久久久久网色| 日韩人妻高清精品专区| 国产日本99.免费观看| 亚洲自拍偷在线| 国产精品蜜桃在线观看 | 丝袜美腿在线中文| av天堂中文字幕网| 美女cb高潮喷水在线观看| av.在线天堂| 免费观看的影片在线观看| 99久久久亚洲精品蜜臀av| 久久精品夜色国产| 2022亚洲国产成人精品| 久久久久性生活片| 亚洲国产精品sss在线观看| 国产91av在线免费观看| 高清日韩中文字幕在线| 观看免费一级毛片| 亚洲av.av天堂| 欧美一级a爱片免费观看看| 亚洲欧洲日产国产| 国产亚洲精品av在线| 一夜夜www| 国产毛片a区久久久久| 亚洲国产欧美人成| 欧美一级a爱片免费观看看| 99在线人妻在线中文字幕| 欧美xxxx性猛交bbbb| 日韩欧美 国产精品| 亚洲欧美日韩高清专用| 国产精品一区二区性色av| 午夜精品在线福利| 三级国产精品欧美在线观看| 久久九九热精品免费| 欧美日韩一区二区视频在线观看视频在线 | 欧美精品国产亚洲| 女的被弄到高潮叫床怎么办| 哪个播放器可以免费观看大片| 女的被弄到高潮叫床怎么办| 免费观看a级毛片全部| 欧美另类亚洲清纯唯美| 亚洲欧美精品专区久久| 久久99热6这里只有精品| 黄片无遮挡物在线观看| 麻豆国产97在线/欧美| 成人午夜精彩视频在线观看| 精品久久久久久久久av| 国产激情偷乱视频一区二区| 成人特级av手机在线观看| 免费av观看视频| 深爱激情五月婷婷| www.av在线官网国产| av卡一久久| 九九在线视频观看精品| 亚洲精品国产av成人精品| 亚洲欧美精品自产自拍| 国产精品久久久久久精品电影小说 | 亚洲精品乱码久久久久久按摩| 精品人妻熟女av久视频| 午夜福利高清视频| 午夜激情欧美在线| 亚洲精品久久久久久婷婷小说 | 精品一区二区免费观看| 九九爱精品视频在线观看| avwww免费| 直男gayav资源| 亚洲av免费在线观看| 啦啦啦韩国在线观看视频| 噜噜噜噜噜久久久久久91| 国产成人一区二区在线| 国产精品久久久久久av不卡| 身体一侧抽搐|