计算机科学 ›› 2021, Vol. 48 ›› Issue (11A): 565-569.doi: 10.11896/jsjkx.210100093
朱容辰1, 李欣1,2, 王晗旭1, 叶瀚1, 曹志威3, 樊志杰3
ZHU Rong-chen1, LI Xin1,2, WANG Han-xu1, YE Han1, CAO Zhi-wei3, FAN Zhi-jie3
摘要: 随着智慧城市、公安大数据的发展,视频监控网络已成为城市治理的重要基础设施。但是,攻击者通过替换或篡改监控摄像头这一重要的前端设备,能够接入内部网络,实现设备劫持、信息窃取、网络瘫痪,威胁个人、社会与国家安全。为了提前识别非法或可疑的摄像头身份,提出了融合多维标识特征的摄像头身份识别方法。通过提取摄像头静态信息与动态流量信息,构建了融合显性、隐性、动态标识符的摄像头身份标识体系。为选择简洁有效的身份标识符,提出了基于自信息量与信息熵的标识符贡献度评估方法,所抽取的标识符特征向量能够为未来的异常摄像头入侵检测奠定基础。实验结果表明,显性标识符自信息量与贡献度最大,但容易被伪造;动态标识符贡献度次之,但流量收集与处理的工作量较大;静态标识符贡献度较低,但仍有一定的身份标识作用。
中图分类号:
[1]LI X,DUAN Y C,HUANG S H,et al.Construction of network security situation index system for video private network[J].Journal of Beijing University of Aeronautics and Astronautics,2020,46(9):1625-1634. [2]DUAN Y C.Extraction and evaluation of network security situation elements for video private network[D].Beijing:People's Public Secu-rity University of China,2020. [3]YIN X M,HU Z L,CHEN G L,et al.Research on IP video private network access detection scheme based on device fingerprint decision tree classification[J].Information Network Secu-rity,2016(12):68-73. [4]LUO J Z,YANG M,LING Z,et al.Cyberspace Security System and key technologies[J].Chinese Science:Information Science,2016,46(8):939-968. [5]BUJLOW T,CARELA-ESPAÑOL V,SOLÉ-PARETA J,et al.A Survey on Web Tracking:Mechanisms,Implications,and Defenses[J].Proceedings of the IEEE,2017,105(8):1476-1510. [6]WANG M,DING Z J.A new method for fingerprint feature selection and model construction of equipment[J].Computer Scie-nce,2020,47(7):257-262. [7]DANEV B,ZANETTI D,CAPKUN S.On physical-layer identification of wireless devices[J].ACM Computing Surveys,2013,45(1):1-29. [8]GERDES R,DANIELS T,PHD M,et al.Device Identificationvia Analog Signal Fingerprinting:A Matched Filter Approach[C]//Proceedings of the Network and Distributed System Security Symposium.2006:1-11. [9]DEY S,ROY N,XU W,et al.AccelPrint:Imperfections of Accelerometers Make Smartphones Trackable[C]//Network and Distributed System Security Symposium.2014:1-16. [10]LI C T.Source Camera Identification Using Enhanced SensorPattern Noise[J].IEEE Transactions on Information Forensics and Security,2010,5(2):280-287. [11]LUKAS J,FRIDRICH J,GOLJAN M.Digital camera identification from sensor pattern noise[J].IEEE Transactions on Information Forensics and Security,2006,1(2):205-214. [12]ZHANG Y T,YAN C H.Research on RFID tag authentication technology based on bidirectional authentication protocol[J].Information Network Security,2016(1):64-69. [13]YANG W C,GUO Y B,LI T,et al.Identification method and security model of Internet of things based on traffic fingerprint[J].Computer Science,2020,47(7):299-306. [14]MEIDAN Y,BOHADANA M,SHABTAI A,et al.ProfilIoT:a machine learning approach for IoT device identification based on network traffic analysis[C]//Proceedings of the Symposium on Applied Computing.2017:506-509. [15]ZHANG L P,LEI D J,ZENG X H.System call intrusion detection method based on frequency eigenvector[J].Computer Scie-nce,2013,40(S1):330-333,339. [16]YAO D,LUO J Y,CHEN W P,et al.Double random forest real-time intrusion detection method based on improved non extensive entropy feature extraction[J].Computer Science,2013,40(12):192-196,218. [17]LIN G Y,HUANG H,ZHANG Y P.Research progress of intrusion detection system[J].Computer Science,2008(2):69-74. [18]LUO C K,CHEN Y X,HU X,et al.Evaluation method of equipment system contribution rate based on combat ring and self information[J].Journal of Shanghai Jiaotong University,2019,53(6):741-748. [19]PENG C G,DING H F,ZHU Y J,et al.Information entropymodel and measurement method of privacy protection[J].Acta Sinica Sinica,2016,27(8):1891-1903. [20]CHI Y,GAO Z W.Construction of hybrid P2P network based on self information algorithm[J].Computer Science,2012,39(S1):159-162. [21]SHANNON C E.A mathematical theory of communication[J].The Bell System Technical Journal,1948,27(3):379-423. [22]MIETTINEN M,MARCHAL S,HAFEEZ I,et al.IoT SENTINEL:Automated Device-Type Identification for Security Enforcement in IoT[C]//2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).2017. |
[1] | 王馨彤, 王璇, 孙知信. 基于多尺度记忆残差网络的网络流量异常检测模型 Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network 计算机科学, 2022, 49(8): 314-322. https://doi.org/10.11896/jsjkx.220200011 |
[2] | 周志豪, 陈磊, 伍翔, 丘东亮, 梁广升, 曾凡巧. 基于SMOTE-SDSAE-SVM的车载CAN总线入侵检测算法 SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm 计算机科学, 2022, 49(6A): 562-570. https://doi.org/10.11896/jsjkx.210700106 |
[3] | 曹扬晨, 朱国胜, 孙文和, 吴善超. 未知网络攻击识别关键技术研究 Study on Key Technologies of Unknown Network Attack Identification 计算机科学, 2022, 49(6A): 581-587. https://doi.org/10.11896/jsjkx.210400044 |
[4] | 魏辉, 陈泽茂, 张立强. 一种基于顺序和频率模式的系统调用轨迹异常检测框架 Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns 计算机科学, 2022, 49(6): 350-355. https://doi.org/10.11896/jsjkx.210500031 |
[5] | 张师鹏, 李永忠. 基于降噪自编码器和三支决策的入侵检测方法 Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions 计算机科学, 2021, 48(9): 345-351. https://doi.org/10.11896/jsjkx.200500059 |
[6] | 李贝贝, 宋佳芮, 杜卿芸, 何俊江. DRL-IDS:基于深度强化学习的工业物联网入侵检测系统 DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things 计算机科学, 2021, 48(7): 47-54. https://doi.org/10.11896/jsjkx.210400021 |
[7] | 程希, 曹晓梅. 基于信息携带的SQL注入攻击检测方法 SQL Injection Attack Detection Method Based on Information Carrying 计算机科学, 2021, 48(7): 70-76. https://doi.org/10.11896/jsjkx.200600010 |
[8] | 俞建业, 戚湧, 王宝茁. 基于Spark的车联网分布式组合深度学习入侵检测方法 Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark 计算机科学, 2021, 48(6A): 518-523. https://doi.org/10.11896/jsjkx.200700129 |
[9] | 曹扬晨, 朱国胜, 祁小云, 邹洁. 基于随机森林的入侵检测分类研究 Research on Intrusion Detection Classification Based on Random Forest 计算机科学, 2021, 48(6A): 459-463. https://doi.org/10.11896/jsjkx.200600161 |
[10] | 贾琳, 杨超, 宋玲玲, 程镇, 李琲珺. 改进的否定选择算法及其在入侵检测中的应用 Improved Negative Selection Algorithm and Its Application in Intrusion Detection 计算机科学, 2021, 48(6): 324-331. https://doi.org/10.11896/jsjkx.200400033 |
[11] | 王颖颖, 常俊, 武浩, 周详, 彭予. 基于WiFi-CSI的入侵检测方法 Intrusion Detection Method Based on WiFi-CSI 计算机科学, 2021, 48(6): 343-348. https://doi.org/10.11896/jsjkx.200700006 |
[12] | 刘全明, 李尹楠, 郭婷, 李岩纬. 基于Borderline-SMOTE和双Attention的入侵检测方法 Intrusion Detection Method Based on Borderline-SMOTE and Double Attention 计算机科学, 2021, 48(3): 327-332. https://doi.org/10.11896/jsjkx.200600025 |
[13] | 马琳, 王云霄, 赵丽娜, 韩兴旺, 倪金超, 张婕. 基于多模型判别的网络入侵检测系统 Network Intrusion Detection System Based on Multi-model Ensemble 计算机科学, 2021, 48(11A): 592-596. https://doi.org/10.11896/jsjkx.201100170 |
[14] | 郇文明, 林海涛. 基于采样集成算法的入侵检测系统设计 Design of Intrusion Detection System Based on Sampling Ensemble Algorithm 计算机科学, 2021, 48(11A): 705-712. https://doi.org/10.11896/jsjkx.201100101 |
[15] | 孔金生, 李婧馨, 段鹏松, 曹仰杰. 基于Wi-Fi信号的人体身份识别算法研究综述 Survey of Human Identification Algorithms Based on Wi-Fi Signal 计算机科学, 2021, 48(10): 246-257. https://doi.org/10.11896/jsjkx.210100076 |
|