期刊文献+

加密流量中的恶意流量识别技术 被引量:21

Research on malicious traffic identification technology in encrypted traffic
在线阅读 下载PDF
导出
摘要 网络流量的加密传输是互联网的发展趋势之一,而加密流量中的恶意流量识别是维护网络空间安全的重要手段。识别恶意流量需要将加密流量进行密/非密、应用程序以及加密算法的细粒度区分以提高识别效率,再将不同精细度区分后的流量经过预处理后转化为图像、矩阵和N-gram等形式导入机器学习训练模型中进行训练,实现良性/恶意流量的二分类以及多分类。基于机器学习的识别效果严重依赖于样本数量和质量,同时无法有效地应对整形和混淆后的流量,而基于密码学的恶意流量识别技术通过深度融合可搜索加密技术、流量审查机制和可证明安全模型,在加密流量上检索恶意关键词以避免样本数目不足和流量整形的问题,同时实现对数据和规则的隐私保护。对加密流量中的恶意流量识别所涉及到的上述技术进行了总结,指出存在的问题并展望未来发展的方向。 The encrypted transmission of network traffic is one of the development trends of the Internet.The identification of malicious traffic in encrypted traffic is an important way to maintain the security of cyberspace.One of the prior tasks of identifying malicious traffic is to classify encrypted traffic into the encrypted/unencrypted,different kinds of the application programs and encryption algorithms in order to improve the efficiency of identification.Then they are transformed into the image,matrix,n-gram or other forms which will be sent into the machine learning training model,so as to realize the binary classification and multi classification of benign malicious traffic.However,the machine learning based way relies seriously on the number and quality of samples,and can not effectively deal with the data after traffic shaping or confusion.Fortunately,cryptography based malicious traffic identification can search malicious keywords over encrypted traffic to avoid such problems,which must integrate searchable encryption technology,deep packet inspection and a provable security model to protect both data and rules.Finally,some unsolved problems of malicious traffic identification technology in encrypted traffic are presented.
作者 曾勇 吴正远 董丽华 刘志宏 马建峰 李赞 ZENG Yong;WU Zhengyuan;DONG Lihua;LIU Zhihong;MA Jianfeng;LI Zan(School of Cyber Engineering,Xidian University,Xi’an 710071,China;State Key Laboratory of Integrated Service Networks,Xidian University,Xi’an 710071,China)
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2021年第3期170-187,共18页 Journal of Xidian University
基金 国家自然科学基金(61941105)。
关键词 加密流量 恶意流量 机器学习 密码学 encrypted traffic malicious traffic machine learning cryptography
  • 相关文献

参考文献10

二级参考文献169

  • 1叶生勤.公钥密码理论与技术的研究现状及发展趋势[J].计算机工程,2006,32(17):4-6. 被引量:15
  • 2CAVALLAR S, et al. Factorization of a 512-bit RSA modulus[A]. Advances in Cryptology- Eurocrypt 2000[C].LNCS 1807,Springer-Verlag, 2000. 1-18.
  • 3BONEH D. Twenty years of attacks on the RSA cryptosystem[J]. Notices of the American Mathematical Society, 1999, 46(2):203-213.
  • 4DUSSEAND J R, KALISKI B. A cryptographic library for the Motorola DSP56000[A]. Advances in Cryptology-Eurocrypt 1990[C].LNCS 473, Springer-Verlag, 1991.230-244.
  • 5KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987,48:203-209.
  • 6MILLER V. Uses of elliptic curves in cryptography[A]. Advances in Cryptology-Crypto 1985[C].LNCS 218, Springer-Verlag,1986.417 -426.
  • 7KOBLITZ N. Hyperelliptic cryptography[J]. Journal of Cryptology, 1989,1(3):139-150.
  • 8CANTOR D G. Computing in the jacobian of a hyperelliptic curve[J]. Mathematics of Computation, 1987, 48(177): 95-101.
  • 9IEEE P1363. Standard Specifications for Public-Key Cryptography Draft[S].1997.
  • 10BROUWER A E, PELLIKAAN R, VERHEUL E R. Doing more with fewer bits[A]. Advances in Cryptology - Asiacrypt 1999[C].LNCS 1716, Springer-Verlag, 1999. 321-332.

共引文献185

同被引文献111

引证文献21

二级引证文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部