期刊文献+

安全态势感知系统中攻击预测的认知模型 被引量:5

A Cognition Model of Attack Prediction in Security Situation Awareness Systems
下载PDF
导出
摘要 本文首先提出了攻击的分层认知模型,并采用引入时间和空间因素的LAMBDA逻辑表达方法对攻击行为认知的方法进行了描述,然后对攻击过程的认知提出了形式化的描述方法,最后给出了分层认知模型在安全态势感知系统中的应用步骤。 This paper puts forward a hierarchical model of attack cognition first, and describes the cognition method of attack behavior by adopting the LAMBDA logic expression method based on time and space factors, and then puts forward a formal description method for the cognition of the attack process. Finally the paper gives the application steps of the hierarchical cognition model in security situation awareness systems.
出处 《计算机工程与科学》 CSCD 2007年第11期17-19,共3页 Computer Engineering & Science
关键词 攻击认知模型 最大可信度路径 最大攻击度路径 最大期望攻击度路径 attack cognition model max trust degree path max attack degree path max anticipated attack degree path
  • 相关文献

参考文献11

  • 1Bass T. Intrusion Detection Systems and Multisensor Data Fusion[J]. Communications of the ACM, 200,143 (4): 99- 105.
  • 2Valdes A,Skinner K. Probabilistic Alert Correlation[J]. Proc of the 4th Int'l Syrup on Recent Advances in Intrusion Detection [C]. 2001.54-68.
  • 3Ning Peng,Reeves D, Cui Yun. Correlating Alerts Using Prerequisites of Intrusions[R]. Technical Report TR-2001-13, Department of Computer Science, North Carolina State University, 2001.
  • 4Ning Peng,Cui Yun. An Intrusion Alert Correlator Based on Prerequisites of Intrusions[R]. Technical Report TR-2002- 01, Department of Computer Science, North Carolina State University, 2002.
  • 5Cuppens F. Managing Alerts in a Multiintrusion Detection Environmnent[A]. Proc of the 17th Annual Computer Security Applications Conf[C]. 2001.
  • 6Debar H,Wespi A. Aggregation and Correlation of IntrusionDetection Alerts[A]. Proc of the 4th Int'l Syrup on Recent Advances in Intrusion Detection[C]. 2001.85-103.
  • 7Cuppens F, Miege A. Alert Correlation in a Cooperative Intrusion Detection Framework[A]. Proc of the IEEE Symp on Security and Prlvacy[C]. 2002.
  • 8Cuppens F,Ortalo R. LAMBDA:A Language to Model a Database for Detection of Attacks[A]. Proc of RAID'00[C]. 2000.
  • 9Captus Networks. The CaptIO and CaptIO-G Security Solutions[EB/OL], http://www. captusnetworks. com/. 2001- 06.
  • 10Dain O, Cunningham R K. Fusing a Heterogeneous Alert Stream into Scenarios[A]. Proc of the 2001 ACM Workshop on Data Mining for Security Applications[C]. 2001.1- 13.

同被引文献52

引证文献5

二级引证文献200

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部