计算机与现代化 ›› 2022, Vol. 0 ›› Issue (11): 37-42.

• 信息安全 • 上一篇    下一篇

可信赖云计算的通信终端攻击行为识别算法

  

  1. (广州华商学院数据科学学院,广东广州511300)
  • 出版日期:2022-11-30 发布日期:2022-11-30
  • 作者简介:毛明扬(1990—),男,湖北武汉人,助教,硕士,研究方向:信息安全技术,E-mail: maomingyang_2022@126.com; 徐胜超(1980—),男,湖北武汉人,讲师,硕士,研究方向:并行分布式处理软件,E-mail: isdooropen@126.com。
  • 基金资助:
    国家自然科学基金青年基金资助项目(61403219); 广东省高等学校科学研究特色创新项目(2021KTSCX167); 广州华商学院校内导师制科研项目(2022HSDS07)

Communication Terminal Attack Behavior Identification Algorithm Based on Trusted Cloud Computing#br#

  1. (School of Data Science, Guangzhou Huashang College, Guangzhou 511300, China)
  • Online:2022-11-30 Published:2022-11-30

摘要: 木马植入等恶意攻击行为给通信终端带来了严重威胁,为此,提出一种可信赖云计算下的通信终端攻击行为识别算法。利用数据采集模块获取通信终端镜像的数据流,通过可信性验证机制将可信任链扩展到云计算环境的虚拟机管理器和通信终端,检测通信终端运行环境的可信性后,攻击行为识别模块采用贝叶斯算法判断数据流是否包含攻击行为,并通过计算攻击行为数据的最大后验概率判断攻击行为所属类别,并将检测结果反映给管理模块,结合速率限制模块限制含有攻击行为的数据流,直到通信终端所受攻击行为结束。实验结果表明:该算法加入可信性动态验证机制能有效提升通信终端访问安全性,并能保证数据在通信终端遭受攻击行为时的顺利传输;不同程度干扰环境下的通信终端攻击行为识别平均绝对百分误差始终低于0.25%。

关键词: 可信赖云计算, 通信终端, 攻击行为, 数据采集, 速率限制, 最大后验概率

Abstract: Malicious attacks such as Trojan horse implantation pose a serious threat to communication terminals. Therefore, a communication terminal attack identification algorithm based on trusted cloud computing is proposed. The data acquisition module is used to obtain the data flow of the image of the communication terminal, and the trustworthiness chain is extended to the virtual machine manager and communication terminal of the cloud computing environment through the credibility verification mechanism. After detecting the credibility of the running environment of the communication terminal, the attack behavior identification module uses Bayesian algorithm to judge whether the data flow contains attack behavior. The maximum a posteriori probability of the attack behavior data is calculated to judge the category of the attack behavior, and the detection results are reflected to the management module. Combined with the rate limiting module, the data flow containing the attack behavior is limited until the end of the attack behavior of the communication terminal. The experimental results show that the algorithm can effectively improve the access security of the communication terminal and ensure the smooth transmission of data when the communication terminal is attacked. The average absolute percentage error of communication terminal attack behavior recognition under different degrees of interference environment is always less than 0.25%.

Key words: trusted cloud computing, communication terminal, aggressive behavior, data acquisition, rate limit, maximum a posteriori probability