期刊文献+

基于SVM成本决策分析模型的入侵响应研究 被引量:2

Intrusion response based on SVM cost-sensitive decision model
下载PDF
导出
摘要 传统入侵响应决策模型只考虑攻击损失和响应成本。在此基础上增加攻击目标的资产价值、响应风险在决策过程中的两个重要因素,分析了各成本的计算方法。提出一种把攻击目标作为无形资产进行评估的方法,并详细描述了采用SVM创建成本决策分析模型的过程。最后,基于日志记录进行攻击响应分析,给出了实验结果,显示该模型的决策结果有较高的正确率。 Traditional intrusion detection model only considers attack damage and response cost. In this study, two important factors in decision process, the property value of attack target and the response risk were added, and the calculation methods with each cost were analyzed. Moreover, a method for assessing attack target as the immaterial asset was proposed and the process that adopted support vector machine (SVM) model to set up the analysis model of the cost decision was described in detail. At last, according to the daily record, the experimental results show that the decision result of this model has higher accuracy.
作者 郭宇 孙敏
出处 《计算机应用》 CSCD 北大核心 2007年第11期2704-2706,共3页 journal of Computer Applications
基金 山西省高校科技开发项目(20051202) 山西大学科研项目(2005103)
关键词 入侵响应 资产评估 成本决策 支持向量机 intrusion response worth assessment of assets cost-sensitive decision Support Vector Machine (SVM)
  • 相关文献

参考文献9

二级参考文献35

  • 1丁勇 龚俭.自动入侵响应系统综述[A]..网络与信息安全2002年度学术交流论文集[C].,..
  • 2D Schnackenberg, K Djahandari, D Sterne. Infrastructure for Intrusion Detection and Response [ C ]. South Carolina: Proceedings of the DARPA Information Survivability Conference and Exposition ( DISCEX), Hilton Head,2000.
  • 3CERT Coordination Center. CERT/CC Statistics 1988-2002 [ EB/OL]. http ://www. cert. org/stats/cert_stats.html,2003-03.
  • 4CERT Coordination Center. CERT Coordination Center 2002 Annual Report[ EB/OL]. http ://www. cert. org/annual_rpts/cert_rpt_02, html,2003-03.
  • 5Fred Cohen. Simulating Cyber Attacks, Defenses, and Consequences[ EB/OL]. http://secinf.net/misc/Simulating_Cyber_Attacks_Defenses_and_Consequences_, html,2003-03.
  • 6Curtis A Carver. Intrusion Response Systems:A Survey [ EB/OL ]. http://faculty. cs. tamu. edu/pooch/course/CPSC665/Spring2001/Lessons/Intrusion_Detection_and_Response/rtirs2. doc ,2003-03.
  • 7C A Carver Jr, U Pooch. An Intrusion Response Taxonomy and its Role in Automatic Intrusion Response [ C ]. New York : IEEE Systems, Man,and Cybernetics Information Assurance and Security Workshop, West Point, 2000.
  • 8Wenke Lee, Wei Fan, et al. Toward Cost- Sensitive Modeling for Intrusion Detection and Response[ C]. In 1st ACM Workshop on Intrusion Detection Systems ,2000.
  • 9Gregory B White,et al. Cooperating Security Managers: A Peer-based Intrusion Detection System [ J ]. IEEE Network, 1996,10 ( 1 ) : 20-23.
  • 10E A Fisch. Intrusion Damage Control and Assessment: A Taxonomy and Implementation of Automated Responses to Intrusive Behavior[ D ]. Ph. D. Dissertation, Texas A&M University, College Station, TX,1996.

共引文献11

同被引文献28

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部