期刊文献+

基于权能转换模型的攻击场景推理、假设与预测 被引量:9

Attack scenarios reasoning,hypothesizing and predicting based on capability transition model
下载PDF
导出
摘要 为了自动地从大量低级的入侵检测告警信息中构建出更高层次的攻击场景,并在一定程度上预测即将发生的攻击,提出了一种基于权能转换模型的实时告警信息相关性分析的方法。通过对推理依据的高度抽象,权能转换模型极大地降低了攻击场景构建过程的复杂度。在DARPA2000测试数据集上的测试实验结果表明,提出的方法是可行的、有效的。 To construct attack scenarios and predict intrusion intents automatically, a real-time alert correlation approach based on capability transition model was proposed. By highly abstracting the reasoning evidences, the process complexity is effectively reduced. Experiment results on the DARPA2000 IDS test dataset indicate that the method is effective and efficient.
出处 《通信学报》 EI CSCD 北大核心 2007年第12期78-84,共7页 Journal on Communications
关键词 网络安全 攻击场景 权能转换模型 入侵检测 Internet security attack scenario capability transition model intrusion detection
  • 相关文献

参考文献13

  • 1李洋,方滨兴,郭莉,田志宏.基于主动学习和TCM-KNN方法的有指导入侵检测技术[J].计算机学报,2007,30(8):1464-1473. 被引量:31
  • 2RICHARD L, SETH W, DOUGLAS S. The effect of identifying vulnerabilities and pathing software on the utility of network intrusion detection[A]. The 5th Int'l Symp on Recent Advances in Intrusion Detection[C]. Zurich, Switzerland, 2002.
  • 3鲍旭华,戴英侠,冯萍慧,朱鹏飞,魏军.基于入侵意图的复合攻击检测和预测算法[J].软件学报,2005,16(12):2132-2138. 被引量:40
  • 4张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 5SALLY F, VAN J. Random early detection gateways for congestion avoidance[J]. IEEE/ACM Transaction on Networking, 1993, 1(4): 397-413.
  • 6DAIN O, CUNNINGHAM R. Building scenarios from a heterogeneous alert stream[A]. Proc of the 2001 IEEE Workshop on Information Assurance and Security[C]. 2001.231-235.
  • 7Honeynet project, know your enemy: statistics[EB/OL], http://project. honeynet.org/papers/stats/2001.
  • 8MIT lincoln lab. 2000 DARPA intrusion detection scenario specific dataset[EB/OL], http://www.ll.mit.edu/IST/ideval/2003.
  • 9NING P, CUI Y, REEVES D S, et al. Techniques and tools for analyzing intrusion alerts[J]. ACM Transactions on Information and System Security(TISSEC), 2004,7(2):274-318.
  • 10诸葛建伟,韩心慧,叶志远,邹维.基于扩展目标规划图的网络攻击规划识别算法[J].计算机学报,2006,29(8):1356-1366. 被引量:17

二级参考文献61

  • 1鲍旭华,戴英侠,冯萍慧,朱鹏飞,魏军.基于入侵意图的复合攻击检测和预测算法[J].软件学报,2005,16(12):2132-2138. 被引量:40
  • 2汪立东.[D].哈尔滨工业大学,2002.
  • 3ASLAM T, KRSUL I, SPAFFORD E H. Use of a taxonomy of security faults[A]. The 19th National Information System Security Conference [C]. Baltimore, Maryland, 1996. 22-25.
  • 4KRSUL I V. Software Vulnerability Analysis[D]. Purdue University, West Lafayette, USA, 1998.
  • 5BISHOP M, BAILEY D. A Critical Analysis of Vulnerability Taxonomies[R]. Technical Report CSE-96-11, Department of Computer Science, University of California, Davis, 1996.
  • 6KNIGHT E, HARTLEY B V. Is your network inviting an attack[J]. Internet Security Advisor, 2000(5/6): 2-5.
  • 7JIWNANI K, ZELKOWITZ M. Maintaining software with a security perspective[A]. ICSM'02[C]. Montréal, 2002. 194-203.
  • 8GLASS R L, VESSEY I. Contemporary application-domain taxonomies[J]. IEEE Software, 1995, 12 (4): 63-76.
  • 9LONGSTAFF T. Update: CERT/CC vulnerability knowledgebase[A]. Technical Presentation at a DARPA Workshop[C]. Savannah, Georgia, 1997.
  • 10Anderson JP. Computer security threat monitoring and surveillance. Technical Report, Contract 79F26400. Fort Washington,Pennsylvania, James P. Anderson Company, 1980.

共引文献113

同被引文献82

引证文献9

二级引证文献75

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部