<th id="5nh9l"></th><strike id="5nh9l"></strike><th id="5nh9l"><noframes id="5nh9l"><th id="5nh9l"></th><strike id="5nh9l"></strike>
<progress id="5nh9l"><noframes id="5nh9l"><th id="5nh9l"><noframes id="5nh9l">
<th id="5nh9l"></th> <strike id="5nh9l"><noframes id="5nh9l"><span id="5nh9l"></span>
<progress id="5nh9l"><noframes id="5nh9l"><span id="5nh9l"><noframes id="5nh9l"><span id="5nh9l"></span><strike id="5nh9l"><noframes id="5nh9l"><strike id="5nh9l"></strike>
<span id="5nh9l"><noframes id="5nh9l">
<span id="5nh9l"><noframes id="5nh9l">
<span id="5nh9l"></span><span id="5nh9l"><video id="5nh9l"></video></span>
<th id="5nh9l"><noframes id="5nh9l"><th id="5nh9l"></th>
<progress id="5nh9l"><noframes id="5nh9l">

基于圖神經網絡增強通信特征的僵尸網絡異常通信檢測

Detection of Botnet anomalous communication based on GNN-enhanced communication features

  • 摘要: 工業互聯網中的傳統工業設備存在大量安全漏洞,在聯網過程中易受僵尸網絡攻擊,其通過惡意控制大量聯網設備,實現對目標網絡的大規模協同攻擊. 傳統基于規則或閾值的檢測方法過度依賴靜態簽名或人工閾值設定,很難適應動態變化的網絡環境;傳統機器學習技術對復雜網絡高維通信特征的處理能力有限,導致檢測能力受限;基于深度學習的檢測技術通常將網絡流量視為時間序列或空間數據進行處理,無法對設備拓撲依賴關系進行建模,因而難以識別僵尸網絡協同攻擊. 為了解決上述局限性,本文采用圖結構準確建模復雜通信網絡拓撲結構,并提出一種基于圖神經網絡增強通信特征的僵尸網絡異常通信檢測技術. 首先從網絡流量數據中挖掘細粒度的節點特征與通信特征;然后通過圖神經網絡的信息傳播與聚合機制,獲得準確的節點聚合特征表示;再用節點聚合特征增強通信特征,實現準確的異常通信檢測;最后在大型公開數據集CTU-13上進行了綜合實驗,驗證所提出方法的有效性. 實驗結果表明所提出的方案與現有的卷積神經網絡、長短時記憶網絡及其融合模型等異常檢測算法,以及最新提出的Bot-DM僵尸網絡檢測方法相比,能更準確地檢測僵尸網絡異常通信.

     

    Abstract: The Industrial Internet is an important part of the national critical information infrastructure. Enabling comprehensive interconnectivity among humans, machines, and Internet of Things devices allows the formation of a new architecture of industrial production, manufacturing, and service. However, a great number of security vulnerabilities exist in industrial devices, especially legacy industrial devices. They can be maliciously exploited during device interconnection, causing severe security incidents or economic losses. Among the major security threats facing the Industrial Internet today, botnet attacks are particularly concerning. By exploiting zero-day vulnerabilities (e.g., buffer overflows in the programmable logic controller firmware) and propagating and deploying polymorphic malware, attackers can covertly hijack a large number of networked devices and recruit compromised devices into botnets to launch coordinated large-scale attacks on target networks. However, traditional botnet detection methods (e.g., rule-, threshold-, and machine learning-based methods) have significant limitations. Rule- and threshold-based botnet detection techniques, which depend heavily on static signatures (e.g., known malicious Internet Protocol lists) or predefined detection thresholds, face challenges in adapting to the dynamic nature of complex network environments, ultimately leading to constrained detection capabilities. Meanwhile, it is not easy for traditional machine learning-based detection techniques to process complex and high-dimensional network communication features effectively, resulting in poor detection performance. Deep learning-based detection techniques, which generally treat network traffic as isolated time-series or spatial data, fail to model the topological dependencies between devices in complex communication networks; this is a key limitation in identifying coordinated botnet behaviors (e.g., synchronized command-and-control communications). To address these challenges, we leverage the pervasive device-to-device connectivity in the Industrial Internet by modeling the communication network as a graph structure, where nodes represent devices and edges represent communication relationships between devices to achieve accurate topology representation. Based on the graph model, we propose a novel approach for detecting botnet anomalous communication based on graph neural network (GNN)-enhanced communication features. First, our method extracts fine-grained node and communication features from network traffic data and employs a GNN to propagate and aggregate node information across the entire network. By capturing topological dependencies, the method can generate more accurate aggregated node feature representations. In this step, the multihead attention mechanism is integrated with the GNN to perform weighted aggregation of node features in diverse ways, enhancing the flexibility of node feature representation. Afterward, the aggregated node features are used to enhance communication features. Finally, a multilayer perceptron model is used to classify the enhanced communication features into the normal or abnormal categories, thus achieving automatic detection of botnet anomalous communication. To validate the effectiveness of the proposed approach, we conducted a series of experiments on a public large-scale dataset, CTU-13, which includes 13 distinct botnet attack scenarios. We compared the proposed approach against a group of baseline methods, including a convolutional neural network (CNN), long short-term memory (LSTM), CNN-LSTM, and the recently proposed Bot-DM method, across a comprehensive set of metrics such as accuracy, recall, precision, and F1-score. The experimental results demonstrate that our approach outperforms existing botnet detection methods in detection performance.

     

/

返回文章
返回
<th id="5nh9l"></th><strike id="5nh9l"></strike><th id="5nh9l"><noframes id="5nh9l"><th id="5nh9l"></th><strike id="5nh9l"></strike>
<progress id="5nh9l"><noframes id="5nh9l"><th id="5nh9l"><noframes id="5nh9l">
<th id="5nh9l"></th> <strike id="5nh9l"><noframes id="5nh9l"><span id="5nh9l"></span>
<progress id="5nh9l"><noframes id="5nh9l"><span id="5nh9l"><noframes id="5nh9l"><span id="5nh9l"></span><strike id="5nh9l"><noframes id="5nh9l"><strike id="5nh9l"></strike>
<span id="5nh9l"><noframes id="5nh9l">
<span id="5nh9l"><noframes id="5nh9l">
<span id="5nh9l"></span><span id="5nh9l"><video id="5nh9l"></video></span>
<th id="5nh9l"><noframes id="5nh9l"><th id="5nh9l"></th>
<progress id="5nh9l"><noframes id="5nh9l">
259luxu-164