期刊文献+

基于FPN的模糊攻击图模型及生成算法研究 被引量:6

Approach to Fuzzy Attack Net Based on Fuzzy Petri Net and its Generating Algorithm
下载PDF
导出
摘要 以模糊Petri网(Fuzzy Petri net,FPN)理论为基础,定义了一种面向检测的新型网络攻击模型FPAN,提出了FPAN的生成算法,并通过实验验证了算法的正确性,该模型比攻击树(Attack Tree)更能够反映各个步骤之间的关系,可重用性也更强,具有较好的实用性。 Based on Fuzzy Petri net (FPN), a new examination-oriented network attack model named Fuzzy Petri-net Attack Net (FPAN) is put forward. Based on this model, a generating algorithm is proposed, and the effectiveness of the algorithm is verified by experiments. Compared to the attack tree, this model can reflect the relationship between each step of the attack; its reusability and usability are also good.
出处 《微电子学与计算机》 CSCD 北大核心 2007年第5期162-165,共4页 Microelectronics & Computer
关键词 模糊PETRI网 攻击树 攻击建模 入侵检测 fuzzy petri net attack tree attack modeling intrusion detection
  • 相关文献

参考文献4

二级参考文献18

  • 1Vandyke Software. Survey Shows How IT Perceives & Responds To Constantly Changing Security Threats. March 4,2003.
  • 2Andrew Conry-Murray. Emerging Technology: Detection vs.Prevention - Evolution or Revolution?. Network Magazine.April 27, 2003.
  • 3Tom Dunigan and Greg Hinkel. Intrusion Detection and Intrusion Prevention on a Large Network: A Case Study. Proceedings of the Workshop on Intrusion Detection and Network Monitoring. Santa Clara, California, USA, April 9-12,1999.
  • 4Ramaprabhu Janakiraman, Marcel Waldvogel, Qi Zhang.Indra: A peer-to-peer approach to network intrusion detection and prevention. Proceedings of IEEE WETICE2003.
  • 5Frincke D, Tobin D, Mcconnell J, Marconi J and Polla D. A framework for cooperative intrusion detection. In Proceedings of the 21st National Information Systems Security Conference, Crystal City, VA, Oct, 1998
  • 6Consystant. The Snort Network Intrusion Detection System on the Intel IXP2400 Network Processor. 2003. http://216.139.29.116/deceng/snort/
  • 7Hawkins D. Identification of Outliers. Chapman and Hall, London 1980[Keywords] Discordancy Test, Normal Distribution,Outliers, Test Statistic, Pvalue, Deviation, Chi Square Distribution, Regression, Multivariate Outliers.
  • 8Eskin E, Arnold A, Prerau M,et al. A Geometric Framework for Unsupervised Anomaly Detection:Detecting Intrusion in Unlabeled data. To Appear in Data Mining for Security Application, Kluwer, 2002.
  • 9Knorr E M, Ng R T. Algorithms for Mining DistanceBased Outliers in Large Dataset. In Proc.of the 24th VLDBConf. New York, USA, 1998.
  • 10KDD Cup 1999 Dataset. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, 1999.

共引文献12

同被引文献33

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部