透過您的圖書館登入
IP:3.21.231.245
  • 會議論文
  • OpenAccess

基於時間域之惡意連線偵測系統設計與實作

摘要


近年來網路的發展已大大的改變人類的生活方式,人們的日常生活已漸漸離不開網路,然而網路使用上便利、匿名的特性,亦讓有心人士有機可趁。本研究發現當惡意網路攻擊產生時,常透過一連串的網路行為來達到匿蹤分散來避免遭到偵測,而這一連串的動作即為攻擊的前兆。目前大部分的研究皆以單一flow/IP 來進行惡意偵測,而忽略flow 間的先後關聯性亦是偵測重點之一。本研究利用懷疑名單、黑名單與網路異常行為分析,並透過追朔及追蹤的方式找出潛藏在內部的惡意使用者。

並列摘要


Nowadays, development of network influences and changes our life a lot. People can almost do everything through the network, and this is what we should be aware of. The availability and anonymity of network are convenient to normal users, but also benefit attackers/hackers too. Our research focus on the time and space distribution method that the malicious flows do to avoid detection. Most of the current research focus on single flow/IP, but actually the relationship between flow/IP in time and space dimension are significant. Using suspicious list, blacklist, and malicious traffic behavior with time traceback and space distributed method, we can effectively and efficiently figure out potential inner malicious device.

延伸閱讀