姚羽(教授)

+

  • 博士生导师  硕士生导师
  • 电子邮箱:
  • 职务:复杂网络系统安全保障技术教育部工程研究中心主任
  • 学历:博士研究生毕业
  • 性别:男
  • 联系方式:yaoyu@mail.neu.edu.cn
  • 学位:博士
  • 毕业院校:东北大学
  • 所属院系:计算机科学与工程学院
  • 学科:
    计算机应用技术
    计算机软件与理论
    计算机系统结构

访问量:

开通时间:..

最后更新时间:..

切换语种:English

手机版
  • 论文成果

Scanner-Hunter: An Effective ICS Scanning Group Identification System

发布时间:2024-01-28  点击次数:

  • 发表刊物:IEEE Transactions on Information Forensics and Security.
  • 摘要:As the precursor of cyber-attacks, the campaigns of scanning groups are able to reflect the attack target and attack trend to a great extent, which provide highly valuable threat intelligence for cyber defenders to understand the current cyber security situation. However, how to identify scanning groups in the context of limited information, especially in the absence of relevant threat intelligence, remains a challenging problem. In this paper, we utilize the honeynet as the unique data source to propose a scanning group identification system, Scanner-Hunter, which focuses on identifying scanning groups targeting ICS devices. To better characterize scanning patterns, a novel traffic representation scheme for scanning traffic is proposed, which is composed of a set of feature vectors to describe all the ICS request packets. On this basis, we propose a novel self-expanding multi-class classification (SEMCC) model and the IP prefix judgment, which are deliberately integrated to cope with sophisticated scanning groups. Take the Modbus protocol as an example, we implement a prototype of Scanner-Hunter, and use six years of real-world honeynet datasets to evaluate its performance. The experimental results illustrate its effectiveness and superior performance compared with some popular machine learning methods and existing SOTA scanning group identification methods. In addition, Scanner-Hunter is further leveraged to investigate the group distribution and maliciousness of 506 unknown scanners, and some suspicious attack groups with APT characteristics are analyzed. Furthermore, accurate scanning group information will contribute to revealing potential attack organizations and supporting decision making to prevent or interrupt cyber-attacks in time.
  • 关键字:Integrated circuits, IP networks, Cyberattack, Behavioral sciences, Telescopes, Analytical models, Reconnaissance
  • 论文类型:CCF A类期刊
  • 备注:https://ieeexplore.ieee.org/document/10415218
  • 文献类型:JCR 一区
  • 是否译文: