期刊文献+

基于马尔科夫的计算机网络缓存侧信道攻击检测方法

Markov⁃Based Detection Method for Cache⁃Side Channel Attack in Computer Networks
在线阅读 下载PDF
导出
摘要 计算机网络缓存侧信道能够间接体现计算机内部状态以及数据传输情况,其受攻击时,用户端信息数据存在泄露风险,因此提出一种基于马尔科夫的计算机网络缓存侧信道攻击检测方法。构建隐马尔科夫模型,对计算机网络缓存侧信道状态改变的概率进行计算。通过Baum‐Welch算法估计隐马尔科夫模型最优参数,并计算缓存侧信道状态观测序列输出概率。比较缓存侧信道观测序列输出概率与设定的阈值,判断该序列为计算机网络缓存侧信道攻击信号的可能性,并引入平均信息熵判断计算机缓存侧信道状态是否存在异常,完成计算机网络缓存侧信道攻击检测。通过实验验证得出,该方法用于计算机网络缓存侧信道攻击检测的准确率高,误报率低,在遭受DDoS攻击(Distributed denial of service)时的检测时间较短,对计算机网络缓存侧信道攻击的防御与保护产生了积极影响。 As the computer network cache side channel indirectly reflects the internal state and data transmission situation of the computer,there is a risk of leakage of user‐side information data when it is attacked.Therefore,a Markovbased detection method for computer network cache side channel attack was proposed.A hidden Markov model was constructed to calculate the probability of channel state changes on the cache side of the computer network.The optimal parameters of the hidden Markov model were estimated by Baum Welch algorithm,and the output probability of the channel state observation sequence on the cache side was calculated.Comparing the output probability of the cache side channel observation sequence with the set threshold,the possibility of the sequence being a computer network cache side channel attack signal was determined.Meanwhile,the average information entropy was employed to determine any abnormality in the computer cache side channel state,to complete the detection of computer network cache side channel attacks.Through experimental verification,it was found that the present method has high accuracy and low false alarm rate when employed in computer network cache side channel attack detection,and a short detection time when subjected to DDoS attacks(Distributed Denial of Service).The method exerts a positive impact on the defense and protection of cache side channel attacks in computer networks.
作者 黄丽芳 HUANG Lifang(School of Information Management,Minnan University of Science and Technology,Shishi Fujian 362700,China)
出处 《海南热带海洋学院学报》 2024年第5期104-110,118,共8页 Journal of Hainan Tropical Ocean University
基金 闽南理工学院科技创新团队项目(23XTD114)。
关键词 计算机网络 信道攻击检测 缓存侧 隐马尔科夫模型 Baum-Welch算法 computer network channel attack detection cache side hidden Markov model Baum‐Welch algorithm
作者简介 黄丽芳,女,福建仙游人,讲师,硕士,研究方向为云计算、数据挖掘以及计算机网络安全。
  • 相关文献

参考文献11

二级参考文献47

  • 1Anderson J P. Computer security threat monitoring[R]. Technical Report, TR80904, Washington: Anderson Co. , 1980.
  • 2Denning D E. An intrusion detection model[J]. IEEE Transactions on Software Engineering. 1987,13(2): 222-232.
  • 3Ye N. A markov chain model of temporal behavior for anomal detection [C]. In:Proceedings of the 2000 IEEE Systems, Man,and Cybernetics Information Assurance and Security Workshop,2000.
  • 4Jha S,Tan K,Maxion R. Markov chains, classifiers, and intrusion detection A[C]. In: Proceedings of Computer Security Foundations Workshop, 14th IEEE. 2001, 206-219.
  • 5Warrender C,Forrest S,Pearlmutter B. Detecting intrusion using system calls: alternative data models[C]. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy. IEEE Computer Society, 1999,133-145.
  • 6Qiao Y, Xin X W, Bin Y, Ge S. Anomaly intrusion detection method based on HMM[J]. Electronics Letters, June 2002,38 (13): 663-664.
  • 7Rabiner L R. A tutorial on hidden markov models and selected applications in speech recognition[J]. Proceedings of the IEEE, 1989,77 (2): 257-286.
  • 8Lunt T F,Tamaru A,Gilham F,Jagannathan R,Neumann P G, Jalali C. IDES: A progress report[C]. In: Proceedings of Annual Computer Security Applications Conference, Tuscon, Arizon a, IEEE Computer Society Press, 1990, 273-285.
  • 9Forrest S,Hofmeyr S A,somayaji A,Longstaff T A. A sense of self for unix processes [C]. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy. Orkland California, 1996, 120-128.
  • 10Eskin E,Wenke L ,Stolfo S J. Modeling system calls for intrusion detection with dynamic window sizes[C]. In: Proceedings of DARPA Information Survivability Conference & Exposition Ⅱ. 2001,165-175.

共引文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部