期刊文献+

一种基于关联分析的攻击场景构造方法 被引量:1

Constructing Attack Scenarios Based on Correlation
下载PDF
导出
摘要 将IDS报警归类为若干种超报警(Hyper-alert)类型,为每种超报警类型定义相应的攻击条件和攻击结果,通过对超报警的关联分析,生成超报警关联图,构造出攻击场景,从而揭示攻击者的攻击策略和攻击意图。 In order to reveal the strategy and intention of attacks, we construct attack scenarios by correlating hyper-alert on the basis of prerequisites and consequences of alert.
出处 《计算机应用研究》 CSCD 北大核心 2006年第12期138-139,142,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(70471064)
关键词 超报警 攻击条件 攻击结果 Hyper-alert Prerequisite Consequence
  • 相关文献

参考文献7

  • 1John P Rouillard.Real-time Log File Analysis Using the Simple Event Correlator[C].Atlanta,GA:University of Massachusetts at Boston for LISA 2004 Conference,2004.
  • 2Paco X Nathan.A Trajectory for the Evolution of SIMS Architecture[EB/OL].http://www.symbiot.com/pdf/pr.081704.pdf,2003.
  • 3Paco Nathan,William Hurley.None Quilibrium Risk Models in Enterprise Network Security Symbiot[EB/OL].http://www.symbiot.com/pdf/pr.081704.pdf,2003
  • 4Peng Ning,Yun Cui,Douglas S Reeves.Analyzing Intensive Intrusion Alerts via Correlation[C].Cambridge,Massachusetts:ACM SIG-COMM'2002,2002.
  • 5王旭仁,毕学尧,许榕生.对IDS审计数据的关联分析[J].计算机工程,2004,30(6):34-35. 被引量:2
  • 6Chandan Singh Negi.Using Network Management Systems to Detect Distributed Denial of Service Attacks[D].Naval Postgraduate School,2001.
  • 7Cristina Abad,Yifan Li.Correlation between NetFlow System and Network View for Intrusion Detection[C].SIAM International Conference on Data Mining(ICDM),2004.

二级参考文献3

  • 1Webb G I. Efficient Search tbr Association Rules. Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Boston, United States,2000.
  • 2Webb G I.OPUS:An Efficient Admissible Algorithm for Unordered Search. Journal of Artificial Intelligence Research, 1995,3:431-465.
  • 3HanJiawei MichelineKamber.数据挖掘概念与技术[M].北京:机械工业出版社,2001.152-160.

共引文献1

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部