UEBA-对等组聚类

针对计算基础设施的网络攻击越来越多,因此需要更为高级的防御解决方案如入侵检测系统(Intrusion Detection Systems,IDS)来对抗攻击。使用网络行为异常检测(Network Behavior Anomaly Detection,NBAD)方法的IDS系统成为基于深度包检测(deep packet inspection,DPI)的传统网络安全系统的有效补充。NBAD系统通过追踪各种网络特征属性并建立正常行为基线检测威胁。而检测结果严重依赖基线的质量。当前有两种生成基线的方法,其一是对每个网络主机分别建立模型,形成按照主机(per-host)模型;其二是对整个网络建立基线,形成按照网络(per-network)模型。per-host模型容易受噪声影响,误报高,而per-network模型整体误报低,召回低。

在以上的情形下,一种以网络内主机群体为研究对象的方法出现,这种方法就是对等组(Peer Groups)。对等组是基于主机行为创建网络主机群体。对等组分析促成NBAD系统检测那些开始表现不同于它们以前相似主机群体行为的单个主机。行为表现出不同于对等组综合行为的主机被标记为异常,需要进一步调查。使用对等组聚类发现异常的方法属于上下文异常检测(Contextual Anomaly detection, CAD)。

关于对等组学术方面的研究:

|------------------------------------------------------------------------------------------|------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| Paper | Data source | Method |
| (1) Community-based anomaly detection detection | HTTP/HTTPS requests and DNS for IP | Method for creating groups of internal network hosts based on their behaviour on the network. Consider two network hosts similar if they regularly visit a similar set of internal and/or external network HTTP/HTTPs server. Each network host is representedby a tuple containing the set of all visited server, port and a vector of frequencies of their visits. Cosine similarity together with approximative clustering is used to create peer groups. |
| (2) Network-Aware Behavior Clustering of Internet End Hosts | IP packets | They use bipartite graphs to model communications of Internet end-hosts. Subsequently, they derive a one-mode projection graphs to capture the behavior similarity of host communications through edges between source (or destination) hosts that talk to the same destinations (or sources). Then, they apply a simple spectral clustering algorithm to discover the inherent behavior clusters within the same network prefixes. For each traffic cluster of network prefixes, they use relative uncertainty concepts in information theory to characterize and interpret its behavior patterns based on traffic features such as source ports, destination ports and IP addresses of packets. |
| (3) Profiling IP Hosts Based on Traffic Behavior | NetFlow | They study the behavior of IP Network nodes in the internet (IP hosts) from the prospective of their communication behavior patterns. They setup up hosts' behavior profiles of the observed IP nodes by clustering hosts into groups of similar communication behaviors over 1 hour windows. Communication behaviors over 1 hour as summarized in a set of features computed over NetFlow. The feature sets are then clustered using DBSCAN. An understanding of the device's normal behavior in relation to its past, to its peer group, and to the wider organization |
| (4) Profiling and Clustering Internet Hosts | Packet headers | From packet headers, they obtain direct and indirect features for each host on a day or two-day basis. 5 Features for clustering: daily distinct destinations, daily bytes sent, list of open ports, and communication similairty computed as the average of Dice similarity values of all the communication pairs for this host (different TCP and UDP communications info). The Dice coefficient is also used as distance metric clustering and agglomerative clustering as clustering algorithm. |
| (5) Role Classification of Hosts within Enterprise Networks Based on Connection Patterns | NetFlow of packets | Uses two algorithms that, used together, partition the hosts on an enterprise network into groups in a way that exposes the logical structure of a network. The grouping algorithm classifies hosts into groups, or "roles," based on their connection habits. Similarity between hosts as a function of the number of common hosts with which they communicate. |
| (6) Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors | IP packets | Whenever a host sends or receives traffic, its sensor verifies whether it is within one standard deviation of its behavior profile and all the other profiles of the cluster where the host is a member. They defined the behavior profile of a user as a set of hourly histograms for each feature that represents a measure of network-related statistics such as: average number of unique users contacted per hour, average number of packets exchanged per hour, and average length of the packets exchanged per hour. Each histogram, computed per port (service) and direction (input or output), represents the hourly average and standard deviation for a feature. They cluster behavior profiles to produce peer groups |

(1) M. Kopp, M. Grill and J. Kohout, "Community-based anomaly detection," 2018 IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, Hong Kong, 2018, pp. 1-6.

(2) K. Xu, F. Wang and L. Gu, "Network-aware behavior clustering of Internet end hosts," 2011 Proceedings IEEE INFOCOM, Shanghai, 2011, pp. 2078-2086.

(3) A. Jakalan, J. Gong and S. Liu, "Profiling IP hosts based on traffic behavior," 2015 IEEE International Conference on Communication Software and Networks (ICCSN), Chengdu, 2015, pp. 105-111.

(4) S. Wei, J. Mirkovic, E. Kissel, (2006), "Profiling and Clustering Internet Hosts".

(5) G. Tan, M. Poletto, J. Guttag, and F. Kaashoek, 2003, "Role classification of hosts within enterprise networks based on connection patterns", In Proceedings of the annual conference on USENIX Annual Technical Conference (ATEC '03), USENIX Association, USA, 2.

(6) V. Frias-Martinez, S. J. Stolfo and A. D. Keromytis, "Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors," 2008 Annual Computer Security Applications Conference (ACSAC), Anaheim, CA, 2008, pp. 367-376. doi: 10.1109/ACSAC.2008.30

相关推荐
dualven_in_csdn5 分钟前
【疑难问题】某些win11机器 网卡统计也会引起dns client 占用cpu问题
运维·服务器·网络
DanB241 小时前
Java(网络编程)
java·网络·php
老蒋新思维1 小时前
创客匠人 2025 峰会深度解析:AI 赋能垂直领域,创始人 IP 变现的差异化路径
大数据·网络·人工智能·网络协议·tcp/ip·重构·知识付费
k***45991 小时前
C#数据库操作系列---SqlSugar完结篇
网络·数据库·c#
TechMasterPlus2 小时前
wireshark使用
网络·测试工具·wireshark
北京耐用通信2 小时前
耐达讯自动化Profibus光纤转换器为您的水处理系统装上“光纤高速路”,数据从此畅通无阻!
网络·人工智能·科技·网络协议·自动化·信息与通信
老蒋新思维2 小时前
创客匠人 2025 峰会深度解析:AI 激活创始人 IP 变现的核心价值
网络·人工智能·网络协议·tcp/ip·创始人ip·创客匠人·知识变现
qq_526099132 小时前
PCIe-8052 双口万兆光纤图像采集卡:万兆传输赋能,解锁工业采集新速度
网络·计算机视觉·自动化
Xの哲學3 小时前
C语言内存函数总结
linux·服务器·网络·架构·边缘计算
LDG_AGI3 小时前
【推荐系统】深度学习训练框架(七):PyTorch DDP(DistributedDataParallel)中,每个rank的batch数必须相同
网络·人工智能·pytorch·深度学习·机器学习·spark·batch