期刊文献+

信息安全报警多级融合模型

Multilevel Fusion Model of INFOSEC Alert
下载PDF
导出
摘要 报警融合是精简冗余报警,识别复杂攻击场景的有效方法,当前的报警融合方法大都局限于融合的特定方面。多级融合模型通过报警的标准化、验证、聚合与关联等环节,可以层层精简报警,从低层报警中抽象出高层攻击场景。实验结果证明该模型是可行的,且具有较高性能。 Alert fusion is an effective method to reduce redundant alerts and recognize complicated attack scenario.Currently,most proposed fusion methods are concentrate on special aspects.The multilevel fusion model can implement alert normalization,verification,aggregation and correlation,the low-level alerts are reduced layer upon layer,and then the high-level attack scenario is abstracted from alerts.The experimental results show that the model is effective and efficient.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第29期154-156,183,共4页 Computer Engineering and Applications
基金 北京市重点建设资助项目(编号:4010001202111) 北京市优秀人才培养专项经费资助项目(编号:20042D0501504)
关键词 信息安全 报警融合 攻击场景 information security, alert fusion, attack scenario
  • 相关文献

参考文献9

  • 1K Julisch.Clustering intrusion detection alarms to support root cause analysis[J].ACM Transactions on Information and System Security, 2003 ;6(4) :443-471
  • 2Richard Lippmann,Seth Webster,Douglas Stetson.The effect of identifying vulnerabilitles and pathing software on the utility of network intrusion detection[C].In:The 5th Int'l Syrnp on Recent Advances in Intrusion Detection ,Zurich, Switzerland ,2002
  • 3P Porras,M Fong,A Valdes.A Mission-Impact-Based Approach to INFOSEC Alarm Correlation[C].In:Proc Int'l Symp The Recent Advances in Intrusion Detection,2002-10:95-114
  • 4Fredrlk Valeur,Giovanni Vigna,Christopher Kruegel et al.A Comprehensive Approach to Intrusion Detection Alert Correlation[J].IEEE Transactions on Dependable and Secure Computing,2004:7-9
  • 5A Valdes,K Skinner.Probabilistic Alert Correlation[C].In:Proc Int'l Symp Recent Advances in Intrusion Detection,2001-10:54-68
  • 6H Debar,A Wespi.Aggregation and Correlation of Intrusion-Detection Alerts[C].In:Proc.Int'l Symp Recent Advances in Intrusion Detection, 2001:85-103
  • 7P Ning,Y Cui,D S Reeves.Constructing Attack Scenarios through Correlation of Intrusion Alerts[C].In:Proc ACM Conf Computer and Comm Security, 2002 : 245-254
  • 8MIT Lincoln Laboratory, Lincoln Lab Data Sets.http ://www.ll.mit.edu/IST/ideval/data/data index.html, 2000
  • 9Xinzhou Qin,Wenke Lee.Attack Plan Recognition and Prediction Using Causal Networks[C].In:Proceedings of the 20th Annual Computer Security Applications Conference(ACSAC'04),2004

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部