吉林大学学报(信息科学版) ›› 2023, Vol. 41 ›› Issue (6): 1086-1092.

• • 上一篇    下一篇

开源网络空间大数据暴力破解攻击识别算法设计 

李雪琛, 张 齐   

  1. 北京警察学院 公安管理系, 北京 102202
  • 收稿日期:2022-09-30 出版日期:2023-11-30 发布日期:2023-12-01
  • 作者简介:李雪琛(1986— ), 女, 安徽六安人, 北京警察学院讲师, 主要从事开源网络、 开源情报、 公安情报和国家安全研究, (Tel)86-13581822003(E-mail)flyingfairy@ 163. com
  • 基金资助:
    教育部哲学社会科学研究重大攻关基金资助项目(CX123456) 

Open Source Big Data Brute Force Attack Identification Algorithm Design in Cyberspace

LI Xuechen, ZHANG Qi   

  1. Department of Public Security Management, Beijing Police College, Beijing 102202, China
  • Received:2022-09-30 Online:2023-11-30 Published:2023-12-01

摘要: 针对暴力破解攻击使网络安全面临重大风险问题, 提出了开源网络空间大数据暴力破解攻击识别算法 设计方案。 构建开源网络空间数据信息模型, 求出参变量矢量的集合, 优化模型变量计算结果。 基于蚁群算法 将特征优化变换成路径搜索问题, 先将网络暴力破解攻击特征当做是蚂蚁要访问的一个位置, 再选择明确状态 转移概率, 将部分搜索细化, 获得全局最优特征。 利用信息增益法度量特征, 求出数据集中各特征信息的 增益, 通过计算单一数据集中间值的函数, 测量样本差异性, 降低数据集合中的离群值, 并与阈值比较识别出 攻击行为。 实验结果表明, 所提算法能精准识别网络暴力破解攻击, 识别率保持在 95% 以上, 且误报率较低、 识别效果最佳。

关键词: 开源网络, 空间大数据, 混沌同步方法, 蚁群算法, 暴力破解攻击, 信息增益, 网络攻击识别, 特征 选择

Abstract: To solve the problem that brute-force attack poses a major risk to network security, this paper proposes an open source brute-force attack recognition algorithm for big data in cyberspace. The open source network space data information model is constructed, the set of parameter vectors is obtained, and the calculation results of model variables are optimized. Based on ant colony algorithm, the feature optimization is transformed into a path search problem. First, the brute-force attack feature is regarded as a location to be visited by ants, and then the state transition probability is selected to refine part of the search to obtain the global optimal feature. Using the information gain method to measure features, the gain of each feature information in the data set is obtained. By calculating the function of the values between single data sets, the sample difference is measured, the outlier value in the data set is reduced, and the attack behavior is identified by comparing with the threshold value. The experimental results show that the proposed algorithm can accurately identify the brute-force attack, the recognition rate is above 95% , the false positive rate is low, and the recognition effect is the best. 

Key words: open source network, spatial big data, chaotic synchronization method, ant colony, brute force attack, information gain, network attack identification, feature selection

中图分类号: 

  • TP393. 0