Visible to the public Network Penetration Identification Method Based on Interactive Behavior Analysis

TitleNetwork Penetration Identification Method Based on Interactive Behavior Analysis
Publication TypeConference Paper
Year of Publication2019
AuthorsXuan, Shichang, Wang, Huanhong, Gao, Duo, Chung, Ilyong, Wang, Wei, Yang, Wu
Conference Name2019 Seventh International Conference on Advanced Cloud and Big Data (CBD)
Date Publishedsep
ISBN Number978-1-7281-5141-0
Keywordsattack identification, attack recognition method, attacker information collection, attacker keystroke record, Computer hacking, computer network security, Data models, feature extraction, gradient disappearance problem, gradient explosion, Hidden Markov models, honeynet, Human Behavior, human factors, interaction behavior, interactive behavior analysis, Internet, keystroke analysis, keystroke sequences, Logic gates, Long short-term memory, long-term memory shortage, LSTM, malicious attacks, Mathematical model, Metrics, national economy, Network penetration identification method, network penetration recognition technology, ordinary recurrent neural network, penetration attack, penetration attacks, pubcrawl, recurrent neural nets, recurrent neural network, Recurrent neural networks, Sebek, Sebek technology, short-short time memory network, time series, time series modeling
Abstract

The Internet has gradually penetrated into the national economy, politics, culture, military, education and other fields. Due to its openness, interconnectivity and other characteristics, the Internet is vulnerable to all kinds of malicious attacks. The research uses a honeynet to collect attacker information, and proposes a network penetration recognition technology based on interactive behavior analysis. Using Sebek technology to capture the attacker's keystroke record, time series modeling of the keystroke sequences of the interaction behavior is proposed, using a Recurrent Neural Network. The attack recognition method is constructed by using Long Short-Term Memory that solves the problem of gradient disappearance, gradient explosion and long-term memory shortage in ordinary Recurrent Neural Network. Finally, the experiment verifies that the short-short time memory network has a high accuracy rate for the recognition of penetration attacks.

URLhttps://ieeexplore.ieee.org/document/8916365
DOI10.1109/CBD.2019.00046
Citation Keyxuan_network_2019