首页|融合威胁情报与知识图谱的网络攻击溯源方法

融合威胁情报与知识图谱的网络攻击溯源方法

扫码查看
[研究目的]攻击溯源是网络空间安全保障的重要组成部分,面对网络空间数据海量、异质多元、结构松散等特点,亟需大数据分析与人工智能相结合,有效识别敌手攻击威胁,溯源攻击链和背后的攻击组织,并实施针对性防御.[研究方法]针对攻击威胁特征识别难的问题,提出了知识图谱驱动的网络攻击溯源方法,以脆弱性利用动作为核心构建攻击事件框架,并以事件为单位实施告警关联,重构攻击场景.在此基础上,利用威胁指纹知识图谱,整合已公开的威胁情报知识,并抽取攻击场景中的威胁特征作为指纹,分析两者相似性,溯源攻击者.[研究结论]实验结果表明,该方法能够利用攻击事件框架充实攻击行为的上下文信息,并基于知识图谱有效溯源攻击者,从而利用攻击者已有的威胁情报,增强高级可持续攻击威胁特征识别的全面性.
A Traceability Method of Network Attacks Combining Threat Intelligence and Knowledge Graph
[Research purpose]Attack traceability is an important part of cyberspace security assurance.Faced with the characteristics of massive,heterogeneous and diverse cyberspace data and loose structure,it is urgent to combine big data analysis with artificial intelligence to effectively identify the threat of enemy attacks,trace the attack chain and the attack organization behind it,and implement targeted de-fense.[Research method]Aiming at the problem that it is difficult to identify attack threat characteristics,this paper proposes a knowl-edge graph driven network attack traceability method.First,an attack event framework is constructed with vulnerability utilization action as the core,and alarm correlation is implemented on an event basis to reconstruct attack scenarios.On this basis,the threat fingerprint knowl-edge graph is used to integrate the published threat intelligence knowledge,extract the threat features in the attack scene as fingerprints,an-alyze the similarity between the two,and trace the attackers.[Research conclusion]The experimental results show that this method can enrich the context information of attack behavior by using the attack event framework,and effectively trace the attackers based on the knowledge graph,thus making use of the existing threat intelligence of attackers to enhance the comprehensiveness of advanced sustainable attack threat feature recognition.

threat intelligencethreat fingerprintknowledge graphattack traceabilitythreat identificationscene reconstruction

张玉臣、孙澄、姜迎畅、马军强、胡浩

展开 >

战略支援部队信息工程大学 郑州 450001

威胁情报 威胁指纹 知识图谱 攻击溯源 威胁识别 场景重构

国家自然科学基金项目

61902427

2024

情报杂志
陕西省科学技术信息研究所

情报杂志

CSTPCDCSSCICHSSCD北大核心
影响因子:1.502
ISSN:1002-1965
年,卷(期):2024.43(8)
  • 9