Current Issue Cover
多步攻击的规则树检测及可视化

胡亮1, 赵剑明1, 解男男1, 努尔布力2(1.吉林大学计算机科学与技术学院, 长春 130012;2.新疆大学信息科学与工程学院, 乌鲁木齐 830046)

摘 要
在网络安全可视化领域中,多步攻击场景呈现过程与日志信息交互性不足,难以让一般的网络安全管理员通过警报日志信息直观发现多步攻击特性。通过实现一种基于规则树的多步攻击场景呈现工具,应用规则树方法对多步攻击行为模式进行描述,通过XML进行模板库定义,设计可视化模型,采用2维向量和3维立体图对比的方法呈现多步攻击场景并分析它们各自的优势,通过实验验证了工具的有效性和设计的合理性。
关键词
Multi-step attacks detected by rules tree and visualization

Hu Liang1, Zhao Jianming1, Xie Nannan1, Nurbol2(1.Department of Computer Science and Technology, Jilin University, Changchun 130012, China;2.School of Information Science and Engineering, Xinjiang University, Urumqi 830046, China)

Abstract
In the cyber security visualization of field, the multi-step attacks visualization has shortage in interacting with logs. This cannot be effective to make the network security administrator find multi-step attacks using logs. In this paper, we present a multi-step attack visualization tool, which is based on rules tree. It describes multi-stage attacks model by rules tree, defines a template library by XML and designs visualization models. It represents the multi-step attacks scene by comparing vector visualization and three-dimensional visualization, and finds the advantages. Our experiments prove the tool’s validity and the design’s rationality.
Keywords

订阅号|日报