Task-Oriented Network Abnormal Behavior Detection Method

被引:0
|
作者
Li, Tao [1 ,2 ,3 ]
Dong, Wenzhe [1 ]
Hu, Aiqun [1 ,2 ,3 ]
Han, Jinguang [1 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210000, Peoples R China
[2] Purple Mt Labs, Nanjing 210000, Peoples R China
[3] Southeast Univ, Frontiers Sci Ctr Mobile Informat Commun & Secur, Nanjing 210000, Peoples R China
基金
美国国家科学基金会;
关键词
Anomaly detection - Denial-of-service attack - Network security - Simulation platform;
D O I
10.1155/2022/3105291
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since network systems have become increasingly large and complex, the limitations of traditional abnormal packet detection have gradually emerged. The existing detection methods mainly rely on the recognition of packet features, which lack the association of specific applications and result in hysteresis and inaccurate judgement. In this paper, a task-oriented abnormal packet behavior detection method is proposed, which creatively collects action identifications during the execution of network tasks and inserts security labels into communication packets. Specifically, this paper defines the network tasks as a collection of state and action sequences to achieve the fine-grained division of the execution of network tasks, performs Hash value matching based on random communication string and action identification sequence for packet authentication, and proposes a mechanism of action identification sequence matching and abnormal behavior decision-making based on a finite state machine, according to the fine-grained monitoring of task execution action sequence. Furthermore, to verify the validity of the anomaly detection method proposed in this paper, a prototype based on the FTP communication platform is constructed, on which the simulation experiments, including the DDOS attack and backdoor attack, are conducted. The experimental results show that the proposed task-oriented abnormal behavior detection method can effectively intercept network malicious data packets and realize the active security defense for network systems.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Task-Oriented Network for Image Dehazing
    Li, Runde
    Pan, Jinshan
    He, Min
    Li, Zechao
    Tang, Jinhui
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2020, 29 : 6523 - 6534
  • [2] TIENet: task-oriented image enhancement network for degraded object detection
    Wang, Yudong
    Guo, Jichang
    Wang, Ruining
    He, Wanru
    Li, Chongyi
    SIGNAL IMAGE AND VIDEO PROCESSING, 2024, 18 (01) : 1 - 8
  • [3] TIENet: task-oriented image enhancement network for degraded object detection
    Yudong Wang
    Jichang Guo
    Ruining Wang
    Wanru He
    Chongyi Li
    Signal, Image and Video Processing, 2024, 18 : 1 - 8
  • [4] TASK-ORIENTED CAMERA ASSIGNMENT IN A VIDEO NETWORK
    Li, Yiming
    Bhanu, Bir
    2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 3473 - 3476
  • [5] Emotion detection in task-oriented spoken dialogs
    Devillers, L
    Lamel, L
    Vasilescu, I
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL III, PROCEEDINGS, 2003, : 549 - 552
  • [6] A TASK-ORIENTED DISASTER INFORMATION CORRELATION METHOD
    Qiu Linyao
    Du Zhiqiang
    Zhu Qing
    ISPRS INTERNATIONAL WORKSHOP ON SPATIOTEMPORAL COMPUTING, 2015, : 169 - 176
  • [7] TASK-ORIENTED ARCHITECTURES
    BISIANI, R
    MAUERSBERG, H
    REDDY, R
    PROCEEDINGS OF THE IEEE, 1983, 71 (07) : 885 - 898
  • [8] Task-oriented Function Detection Based on Operational Tasks
    Ishikawa, Yuchi
    Ishikawa, Haruya
    Akizuki, Shuichi
    Yamazaki, Masaki
    Taniguchi, Yasuhiro
    Aoki, Yoshimitsu
    2019 19TH INTERNATIONAL CONFERENCE ON ADVANCED ROBOTICS (ICAR), 2019, : 635 - 640
  • [9] AN EXPERIMENTAL-METHOD FOR INVESTIGATING TASK-ORIENTED DIALOGS
    ANDERSON, A
    BULLETIN OF THE BRITISH PSYCHOLOGICAL SOCIETY, 1982, 35 (SEP): : A63 - A63
  • [10] Study on a method for task-oriented domain knowledge push
    Wang, Jun
    You, Weijia
    Sun, Weiliang
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 5329 - 5332