期刊文献+

基于攻击群模型的协同入侵的响应方法 被引量:2

A Response Method for Cooperative Intrusions Based on the Attack Group Model
下载PDF
导出
摘要 本文提出了一种通过关系图建立攻击群模型的方法,在时间特征及因果关系的约束条件下,判断攻击序列,重构协同入侵行为的攻击过程,在无须考虑攻击群中个体的响应成本与损失成本的比例的情况下,及时对攻击行为做出响应,从而达到最大程度地减少响应成本的目的. A method for establishing the attack group model by means of the relationship graph of various attacks has been proposed. Under the constraints of time characteristics as wen as the causality relation it can determine the attack sequence and reconstruct the attack sequence of the cooperative intrusion. Beside, make a timely response without considering the ratio of damage cost and response cost of the individual attack, so as to achieve the maximal reduction of the response cost.
出处 《电子学报》 EI CAS CSCD 北大核心 2009年第11期2416-2419,共4页 Acta Electronica Sinica
基金 吉林省科技计划重大项目(No.20076004)
关键词 入侵响应 协同入侵 攻击群 攻击关系图 极小支配集 intrusion response cooperative intrusions attack group attack relationship graphs Minimal dominating set
  • 相关文献

参考文献11

二级参考文献76

  • 1蒋屹新,林闯,曲扬,尹浩.基于Petri网的模型检测研究[J].软件学报,2004,15(9):1265-1276. 被引量:20
  • 2冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:31
  • 3Curtis A Carver,Udo W Pooch.An intrusion response taxonomy and its role in automatic intrusion response[A].Proceeding of the 2000 IEEE Workshop on Information Assurance and Security[C].West Point,NY:United states military academy,2000.129-135. 被引量:2
  • 4Christopher W Geib,Robert P Goldman.Plan recognition in intrusion detection system[A].In DARPA Information Survivability Conference & Exposition II[C].Hilton Anaheim,California,2001.46-55. 被引量:1
  • 5Dan Schnackenberg,Kelly Djahandari,Dan Sterne.Infrastructure for intrusion detection and response[A].Proceedings of the DARPA Information Survivability Conference and Exposition(DISCEX) 2000[C].Hilton Head,S.C,2000.1507-1516. 被引量:1
  • 6Dan Schnackenberg,et al.Cooperative intrusion traceback and response architecture(CITRA)[A].Proceedings of the DARPA Information Survivability Conference and Exposition(DISCEX) 2001[C].Anaheim Califonia,2001. 被引量:2
  • 7ZHANG Jian,GONG Jian,DING Yong.Intrusion detection system based on fuzzy default logic[A].Proceeding of the 2003 IEEE Workshop on Fuzzy System[C].St.Louis,2003. 被引量:1
  • 8Wenke Lee,Wei Fan,et al.Toward cost-sensitive modeling for intrusion detection and response[J].Journal of Computer Security,2002,10(1):318-336. 被引量:1
  • 9Christina Warrender,Stephanie Forrest,Barak Pearlmutter.Detecting intrusion using system calls:Alternative data models[J].Proceedings of the 1999 IEEE Symposium on Security and Privacy,1999:133-145. 被引量:1
  • 10Wu-FTPd Remote Heap Overflow Exploit (In Java) [CP/OL].Available at http://www.securiteam.com/exploits/5KP0S2A7FY.html,2002-06-28. 被引量:1

共引文献79

同被引文献9

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部