期刊文献+

基于Petri网的工作流和J2EE框架构建入侵响应模型

A Model of Intrusion Response based on Petri Net Workflow and J2EE Framework
下载PDF
导出
摘要 通过分析当前入侵响应系统存在的问题,提出了一种基于Petri网的工作流和J2EE框架构建的入侵响应模型,该模型先对所有报警事件进行过滤然后予以响应,并在响应当前报警事件的同时根据报警信息之间的关系,对进一步可能发生的攻击作出在线的预警并产生相应的响应措施。通过实验分析,该模型能够在入侵发生后主动采取措施阻击入侵的延续和降低系统的损失,保护受害系统。 Through analyzing the existence questions of current intrusion response system, this paper proposes an intrusion response model based on Petrl Net workflows and J2EE framework. This model filtrates alarm before response, at the same time, it can also predict the coming attacks via on-line mode and make the corresponding response measures according to the relations among alarm message. Through experiment analysis, the intrusion response systems can forwardly take measures to hold back continuing intrusion, minimize the loss of the system and protect the suffering systems after the intrusion happened.
机构地区 太原理工大学
出处 《电脑开发与应用》 2007年第1期49-52,共4页 Computer Development & Applications
关键词 肯定选择算法 PETRI网 工作流 入侵响应 positive selection algorithm, Petri net, workflows ,intrusion response
  • 相关文献

参考文献10

  • 1G Berthelot, R Terrat. Petri nets theory for the correcting of protocol [J].IEEE Trans on Communications, 1982,30 (12) : 56-61.
  • 2Y Y Du, C J Jiang. Formal Representation and Analysis of Batch Stocks Trading Systems Through Logical Petri Net Workflows., Lecture Notes in Computer Science, 2002,10 : 20-23.
  • 3Stephanie Forrest, Steven A Homeyr, Anil Somayaji.Computer Immunology. Communication of the ACM,1997,40(10) : 125-131.
  • 4Paul K Harmer, Paul D Willams , Gregg H Gunsch,Gary B Lamont. An Artificial Immune System Architecture for Computer Security Applications.IEEE Transactions on Evolutionary Computation,2002,6(3) : 15-23.
  • 5Curtis A Carver, John M D Hill, Udo W Pooch. Limiting Uncertainty in Intrusion Response";Proceedings of the IEEE Workshop on Information Assurance and Security, 2001.
  • 6Wenke Lee. Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security, 2002,10 (1/2) : 318-336.
  • 7Curry D, Debar H. Intrusion detection message exchange format data model and extensible markup language (XML) document type definition[J]. IETF Network Working Group, 2001,9 (3) : 28-36.
  • 8GUO Dai fei, YANG Yi xian, HU Zheng ming (Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, P. R. China).Design of Secure Distributed Intrusion Detection Systems[J].The Journal of China Universities of Posts and Telecommunications,2002,9(2):17-24. 被引量:5
  • 9Thomas Toth and Christopher K. Evaluating the impact of automated intrusion response mechanisms[C ]. 18th, Annual Computer Security Applications Conference ,Las Vegas ,Decmber. 2002.
  • 10D Dasgupta, F Nino. A Comparison of Negative and Positive Selection Algorithms in Novel Pattern Detection. USA: Proceedings of the IEEE International Conference on Systems ,Nashville ,2000.

二级参考文献1

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部