期刊文献+

基于成本评估模型的入侵响应系统研究 被引量:3

Research on the Intrusion Response System Based on Cost-Sensitive Model
下载PDF
导出
摘要 入侵检测系统可以检测已发生的入侵行为并发出警告。自动入侵响应系统是入侵检测系统的扩展,它可以对检测到的攻击行为自动进行响应,因此对保护网络安全起重要的作用,而各种成本因素对其性能的影响很大。该文给出了自动入侵响应系统的构架,并介绍了一种基于成本评估模型的自动入侵响应系统:描述了其理论基础,分析了各种成本的计算方法及攻击行为分类对成本的影响,总结出成本模型公式;详细描述了创建该模型的方法,包括资产评估和机器学习等;使用仿真技术模拟攻击和响应,给出了实验结果,结果表明使用该模型能极大地降低响应成本;对该模型进行了一些改进以使其可以扩展到有效防御复杂攻击;指出了今后的研究方向。 Intrusion detection systems can detect the intrusion behaviors and give a warning. Intrusion response systems, which can automatically respond to the attack behaviors according to the result of the intrusion detection, are the expansion of the intrusion detection systems, so it is important for protecting network security, and varieties of cost factors take much effect on its performance. This paper gives the architecture of the automatic intrusion response systems, introduces one system based on cost - sensitive model: describes the theoretical basis of the model by analyzing the computation method of cost factors and the effect which the classification of the attack behaviors takes to the costs, and then sums up the cost model formation; describes the method to create the model including assets assessment and machine learning; simulates the attack and response behaviors using simulation technology, and gives the result which shows that intrusion response systems using this model can reduce response cost much; gives some modifications on the model to expand it to defend the complex attack; figures the future research direction.
出处 《计算机仿真》 CSCD 2006年第5期249-253,共5页 Computer Simulation
关键词 入侵响应 成本因素 成本评估模型 Intrusion response Cost factor Cost- sensitive model
  • 相关文献

参考文献6

  • 1W Lee,S J Stolfo and K W Mok.A data mining framework for building intrusion detection models[C].In Proceedings of the 1999 IEEE Symposium on Security and Privacy,May 1999.
  • 2马欣,张玉清,顾新,冯涛.自动入侵响应技术研究[J].计算机应用研究,2004,21(4):91-94. 被引量:4
  • 3Wenke Lee,Wei Fan,Matthew Miller,Salvatore J Stolfo and Erez Zadok.Toward Cost-Sensitive Modeling for Intrusion Detection and Response[J].Journal of Computer Security,2002,10(1,2).
  • 4U Lindqvist and E Jonsson.How to systematically classify computer security intrusions[C].In Proceedings of the IEEE Symposium on Research in Security and Privacy,Oakland CA,May 1997.
  • 5Matthew Miller.Learning cost-sensitive classification rules for network intrusion detection using ripper[R].Computer Science Department,Columbia University,June 1999.
  • 6W W Cohen.Fast effective rule induction[C].In Machine Learning:the 12th International Conference,Lake Taho,CA,1995.Morgan Kaufmann.

二级参考文献11

  • 1丁勇 龚俭.自动入侵响应系统综述[A]..网络与信息安全2002年度学术交流论文集[C].,..
  • 2D Schnackenberg, K Djahandari, D Sterne. Infrastructure for Intrusion Detection and Response [ C ]. South Carolina: Proceedings of the DARPA Information Survivability Conference and Exposition ( DISCEX), Hilton Head,2000.
  • 3CERT Coordination Center. CERT/CC Statistics 1988-2002 [ EB/OL]. http ://www. cert. org/stats/cert_stats.html,2003-03.
  • 4CERT Coordination Center. CERT Coordination Center 2002 Annual Report[ EB/OL]. http ://www. cert. org/annual_rpts/cert_rpt_02, html,2003-03.
  • 5Fred Cohen. Simulating Cyber Attacks, Defenses, and Consequences[ EB/OL]. http://secinf.net/misc/Simulating_Cyber_Attacks_Defenses_and_Consequences_, html,2003-03.
  • 6Curtis A Carver. Intrusion Response Systems:A Survey [ EB/OL ]. http://faculty. cs. tamu. edu/pooch/course/CPSC665/Spring2001/Lessons/Intrusion_Detection_and_Response/rtirs2. doc ,2003-03.
  • 7C A Carver Jr, U Pooch. An Intrusion Response Taxonomy and its Role in Automatic Intrusion Response [ C ]. New York : IEEE Systems, Man,and Cybernetics Information Assurance and Security Workshop, West Point, 2000.
  • 8Wenke Lee, Wei Fan, et al. Toward Cost- Sensitive Modeling for Intrusion Detection and Response[ C]. In 1st ACM Workshop on Intrusion Detection Systems ,2000.
  • 9Gregory B White,et al. Cooperating Security Managers: A Peer-based Intrusion Detection System [ J ]. IEEE Network, 1996,10 ( 1 ) : 20-23.
  • 10E A Fisch. Intrusion Damage Control and Assessment: A Taxonomy and Implementation of Automated Responses to Intrusive Behavior[ D ]. Ph. D. Dissertation, Texas A&M University, College Station, TX,1996.

共引文献3

同被引文献32

引证文献3

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部