基于过程挖掘和迹聚类的网络攻击建模分析方法
DOI:
作者:
作者单位:

作者简介:

通讯作者:

基金项目:


Modeling and Analysis Method for Network Attacks Based on Process Mining and Trace Clustering
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
    摘要:

    目的 针对网络入侵检测系统发出的大量警报信息分析困难的问题,提出一种基于过程挖掘和迹聚类的网 络攻击警报建模分析方法,根据网络安全日志信息建立并简化网络攻击模型。 方法 该方法使用过程挖掘技术分析 警报信息中的所包含的攻击者的行为信息和所使用的攻击方法信息,并以高层次可视化模型向网络管理人员提供 攻击信息。 利用基于频繁序列模式的迹聚类技术对日志活动间的行为关系进行分析,提取出活动的频繁序列模 式,并且根据频繁序列模式对迹进行匹配,将相似的迹聚为一类,从而将一个警报日志 L 的复杂网络攻击警报模型 分解为多个子日志的简单、直观的子模型。 结果 仿真实验表明:提出方法得到的网络攻击模型在精确度、适应度和 F1 分数上均有较好的表现;对于复杂的攻击模型,使用迹聚类方法可以生成多个低复杂性的模型,有效地降低其 复杂性。 结论 该网络攻击建模方法引入过程挖掘和迹聚类后,相较于传统建模分析方法可以更有效地反映出网络 攻击者的入侵策略,并且对于复杂的攻击模型可以有效地降低其复杂程度。

    Abstract:

    Objective Aiming at the difficulty in analyzing a large number of alert messages issued by network intrusion detection systems a method for modeling and analyzing network attack alerts based on process mining and trace clustering was proposed to build and simplify the network attack model according to network security log information. Methods This method used process mining technology to analyze the behavioral information of attackers and the attack methods contained in alert messages and provided attack information to network administrators through high-level visualization models. Behavioral relationships among log activities were analyzed using frequent sequence pattern-based trace clustering to extract frequent sequence patterns of activities and similar traces were clustered into one class by matching traces based on frequent sequence patterns thus decomposing the complex network attack alert model of a log L into simple and intuitive sub-models of multiple sub-logs. Results Simulation experiments indicated that the proposed method yielded network attack models with good performance in terms of precision fitness and F1 score. For complex attack models the utilization of trace clustering methods could generate multiple low-complexity models effectively reducing their complexity. Conclusion This modeling method for network attacks with the introduction of process mining and trace clustering can effectively reflect the intrusion strategies of network attackers compared with traditional modeling and analysis methods and can effectively reduce the complexity of complex attack models.

    参考文献
    相似文献
    引证文献
引用本文

魏永鹏.基于过程挖掘和迹聚类的网络攻击建模分析方法[J].重庆工商大学学报(自然科学版),2025,42(6):78-85
WEI Yongpeng. Modeling and Analysis Method for Network Attacks Based on Process Mining and Trace Clustering[J]. Journal of Chongqing Technology and Business University(Natural Science Edition),2025,42(6):78-85

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
历史
  • 收稿日期:
  • 最后修改日期:
  • 录用日期:
  • 在线发布日期: 2025-11-19
×
2024年《重庆工商大学学报(自然科学版)》影响因子显著提升