网络攻击的两级分类方法

Yanyan Li, Zhichun Jia, Qiuyang Han, Xing Xing
{"title":"网络攻击的两级分类方法","authors":"Yanyan Li, Zhichun Jia, Qiuyang Han, Xing Xing","doi":"10.1109/YAC.2019.8787727","DOIUrl":null,"url":null,"abstract":"With the development of computer network technology and the expanding application fields, the types of attacks on the system are becoming more and more complex. The systems security and attack classification are always two challenges for application service providers and enterprises. In recent years, many researchers have turned more attention to them and established evaluation and classifiers that can detect feature selection of network traffic anomalies. However, most research work does not cross-validate evaluation results, and there is no way to distinguish between different types of attacks. All kinds of facts prove that it is necessary to take appropriate countermeasures and defensive attacks. In this paper, we propose a classification framework and use a popular public data set KDD to establish a two-level similarity classification model. According to the attack similarity, our method can quickly and correctly classify the attacks. The experimental results show that our method is effective.","PeriodicalId":6669,"journal":{"name":"2019 34rd Youth Academic Annual Conference of Chinese Association of Automation (YAC)","volume":"17 1","pages":"274-279"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Two-level Classification Method for Attacks on the Network\",\"authors\":\"Yanyan Li, Zhichun Jia, Qiuyang Han, Xing Xing\",\"doi\":\"10.1109/YAC.2019.8787727\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development of computer network technology and the expanding application fields, the types of attacks on the system are becoming more and more complex. The systems security and attack classification are always two challenges for application service providers and enterprises. In recent years, many researchers have turned more attention to them and established evaluation and classifiers that can detect feature selection of network traffic anomalies. However, most research work does not cross-validate evaluation results, and there is no way to distinguish between different types of attacks. All kinds of facts prove that it is necessary to take appropriate countermeasures and defensive attacks. In this paper, we propose a classification framework and use a popular public data set KDD to establish a two-level similarity classification model. According to the attack similarity, our method can quickly and correctly classify the attacks. The experimental results show that our method is effective.\",\"PeriodicalId\":6669,\"journal\":{\"name\":\"2019 34rd Youth Academic Annual Conference of Chinese Association of Automation (YAC)\",\"volume\":\"17 1\",\"pages\":\"274-279\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 34rd Youth Academic Annual Conference of Chinese Association of Automation (YAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/YAC.2019.8787727\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 34rd Youth Academic Annual Conference of Chinese Association of Automation (YAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/YAC.2019.8787727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

随着计算机网络技术的发展和应用领域的不断扩大,对系统的攻击类型也越来越复杂。系统安全与攻击分类一直是困扰应用服务提供商和企业的两大难题。近年来,许多研究者开始关注这些问题,并建立了能够检测网络流量异常特征选择的评估和分类器。然而,大多数研究工作并没有交叉验证评估结果,也没有办法区分不同类型的攻击。各种事实证明,采取适当的对策和防御攻击是必要的。本文提出了一种分类框架,并利用流行的公共数据集KDD建立了两级相似度分类模型。根据攻击相似度对攻击进行快速、准确的分类。实验结果表明,该方法是有效的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Two-level Classification Method for Attacks on the Network
With the development of computer network technology and the expanding application fields, the types of attacks on the system are becoming more and more complex. The systems security and attack classification are always two challenges for application service providers and enterprises. In recent years, many researchers have turned more attention to them and established evaluation and classifiers that can detect feature selection of network traffic anomalies. However, most research work does not cross-validate evaluation results, and there is no way to distinguish between different types of attacks. All kinds of facts prove that it is necessary to take appropriate countermeasures and defensive attacks. In this paper, we propose a classification framework and use a popular public data set KDD to establish a two-level similarity classification model. According to the attack similarity, our method can quickly and correctly classify the attacks. The experimental results show that our method is effective.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信