首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机的应用论文--计算机网络论文--一般性问题论文

云计算中的高级持久威胁攻击的建模与检测

Acknowledgements第4页
Dedication第4-5页
摘要第5-6页
Abstract第6-7页
List of Abbreviations第14-15页
1 Introduction第15-26页
    1.1 Background第15-16页
    1.2 APT Attacks in Cloud Computing第16-18页
    1.3 Modeling APT Attacks in Cloud Computing Networks第18-19页
    1.4 Problem Statement and Research Questions第19-22页
    1.5 Innovations and Contributions第22页
    1.6 Scope and Significance of the study第22-24页
    1.7 Organization of the dissertation第24-26页
2 Literature Review第26-45页
    2.1 Cyber-attacks in Cloud Computing Service Models第26-30页
    2.2 Cyber-attacks on Cloud Computing Deployment Models第30-32页
    2.3 Cyber and APT Attacks Modeling第32-43页
        2.3.1 Cyber-attacks Modeling Approaches第38-40页
        2.3.2 APT Attacks Modeling Approaches第40-43页
    2.4 Literature Review Summary第43-45页
3 Design of the Modeling Methodology第45-55页
    3.1 Finite State Machines Model-APT States Modeling第46页
    3.2 Bayesian Networks Model-Vulnerability Exploitation第46页
    3.3 Complex Networks Model-Detection Modeling第46页
    3.4 APTs Botnets Utilization第46-48页
    3.5 Datasets第48-52页
        3.5.1 Data Processing and Analysis Methods第50页
        3.5.2 CVEs Datasets Processing第50-51页
        3.5.3 LANL Datasets Processing第51-52页
    3.6 Tools and Hardware Considerations第52-55页
        3.6.1 Data Processing Tools第52-53页
        3.6.2 Data Manipulation and Evaluation Tools第53页
        3.6.3 Network Graphing and Visualization Tools第53-54页
        3.6.4 Data Clustering and Classification Tools第54页
        3.6.5 Hardware and Testbed Environments第54页
        3.6.6 Scope and Limitations第54-55页
4 The Bayesian Networks APT Attack Model第55-72页
    4.1 APT Attackers Profiling第55-56页
    4.2 Attacker's perception vs Actual system exploitability第56-58页
    4.3 Cloud Infrastructure Layer Partitioning第58-72页
        4.3.1 Attack Paths Formalizations第59-63页
        4.3.2 The Bayesian Attack Network第63-64页
        4.3.3 Conditional Probabilities with detection第64-65页
        4.3.4 Path Derivations and Conditional Probability Assignments第65-67页
        4.3.5 Optimized Shortest Path Algorithm and Edge Weighting第67-69页
        4.3.6 Attack Complexity and Time Cost第69-72页
5 Finite State Machine Model for APT Attacks第72-88页
    5.1 FSM Model for APT Attacks on Discrete Hosts第72-81页
        5.1.1 Security States and Transitions of a Discrete Host第73-79页
        5.1.2 Formulation of the APT Attack Model第79页
        5.1.3 Attack Tree Integration and Analysis第79-81页
    5.2 FSM Model for Bayesian Networks APT Attacks第81-84页
        5.2.1 APT Attack Source第82-83页
        5.2.2 APT Attack State第83页
        5.2.3 APT Attack Nodes第83-84页
    5.3 Global FSM Model for APT Attacks第84-88页
        5.3.1 APT Attack State Transition Table第85-86页
        5.3.2 APT Attacks K-maps第86-88页
6 Complex Networks Model for APT Attacks Detection第88-102页
    6.1 Unpredictability of APT Attack Lifecycle Stages第88-90页
    6.2 Dynamism of APT-ANs and Communication Networks第90-92页
    6.3 Imbalanced Data Distribution第92-94页
    6.4 Small World Communication Network Model第94-95页
    6.5 Scale-Free APT-AN Network Model第95-99页
    6.6 Scarcity of Public APT Data第99页
    6.7 FSM State Changes of Complex Network Nodes in APT-ANs第99-102页
7 Data Preprocessing and Formatting第102-111页
    7.1 CVEs and Base Scores第102-105页
    7.2 Network flows and DNS第105-109页
    7.3 Feature Normalization第109-111页
8 Modeling Results and Analyses第111-127页
    8.1 Bayesian Network Based APT Attack Paths第111-116页
    8.2 Detection of Multi-stages APTs by a Semi-supervised LearningApproach第116-127页
        8.2.1 Detection in the Infiltration Phase第118-119页
        8.2.2 Detection in the Lateral Movement Phase第119-120页
        8.2.3 Detection in the C2 Beaconing and Exfiltration Phase第120页
        8.2.4 Application of the Clustering and Classification Algorithms第120-127页
9 Conclusion and Future Directions第127-130页
    9.1 Conclusion and Significance第127-128页
    9.2 Future Directions第128-130页
References第130-146页
作者简历及在学研究成果第146-150页
学位论文数据集第150-151页

论文共151页,点击 下载论文
上一篇:基于双环结构的隐蔽攻击及其检测
下一篇:雾计算环境下入侵防御模型及算法研究