基于代价分析的入侵响应决策模型的研究
摘要
给出了基于代价分析的自动入侵响应决策模型。结合事件响应方法学提出了一个面向响应的多维入侵事件分类模型,描述了代价分析模型的理论基础,分析了各种代价的计算方法,总结出代价模型公式,并描述了使用机器学习创建该模型的方法。
出处
《黑龙江科技信息》
2008年第1期64-64,共1页
Heilongjiang Science and Technology Information
二级参考文献11
-
1丁勇 龚俭.自动入侵响应系统综述[A]..网络与信息安全2002年度学术交流论文集[C].,..
-
2D Schnackenberg, K Djahandari, D Sterne. Infrastructure for Intrusion Detection and Response [ C ]. South Carolina: Proceedings of the DARPA Information Survivability Conference and Exposition ( DISCEX), Hilton Head,2000.
-
3CERT Coordination Center. CERT/CC Statistics 1988-2002 [ EB/OL]. http ://www. cert. org/stats/cert_stats.html,2003-03.
-
4CERT Coordination Center. CERT Coordination Center 2002 Annual Report[ EB/OL]. http ://www. cert. org/annual_rpts/cert_rpt_02, html,2003-03.
-
5Fred Cohen. Simulating Cyber Attacks, Defenses, and Consequences[ EB/OL]. http://secinf.net/misc/Simulating_Cyber_Attacks_Defenses_and_Consequences_, html,2003-03.
-
6Curtis A Carver. Intrusion Response Systems:A Survey [ EB/OL ]. http://faculty. cs. tamu. edu/pooch/course/CPSC665/Spring2001/Lessons/Intrusion_Detection_and_Response/rtirs2. doc ,2003-03.
-
7C A Carver Jr, U Pooch. An Intrusion Response Taxonomy and its Role in Automatic Intrusion Response [ C ]. New York : IEEE Systems, Man,and Cybernetics Information Assurance and Security Workshop, West Point, 2000.
-
8Wenke Lee, Wei Fan, et al. Toward Cost- Sensitive Modeling for Intrusion Detection and Response[ C]. In 1st ACM Workshop on Intrusion Detection Systems ,2000.
-
9Gregory B White,et al. Cooperating Security Managers: A Peer-based Intrusion Detection System [ J ]. IEEE Network, 1996,10 ( 1 ) : 20-23.
-
10E A Fisch. Intrusion Damage Control and Assessment: A Taxonomy and Implementation of Automated Responses to Intrusive Behavior[ D ]. Ph. D. Dissertation, Texas A&M University, College Station, TX,1996.
-
1陈富强,奚建清.商覆盖立方体中下掘与上卷操作的查询算法设计[J].信息技术,2011,35(4):37-39.
-
2何越强.使用代价分析的向量化循环分割技术[J].计算机工程与设计,2011,32(6):2020-2023.
-
3霍卓群.基于实时资源状况和代价分析的ETL动态调整研究[J].南阳理工学院学报,2015,7(6):40-42. 被引量:1
-
4葛立青,程光,龚俭.优化端至端SLA的代价分析[J].计算机工程与应用,2003,39(6):145-147. 被引量:1
-
5金梅,郝忠孝.基于R树的空间连接查询代价分析[J].齐齐哈尔大学学报(自然科学版),2005,21(1):52-54. 被引量:1
-
6王书爱.分布式数据库系统的查询优化策略[J].计算机与网络,2008,34(10):52-54.
-
7王书爱.分布式数据库系统的查询优化策略[J].宁波职业技术学院学报,2008,12(2):57-59.
-
8方敏,李浩.基于状态回溯代价分析的启发式Q学习[J].模式识别与人工智能,2013,26(9):838-844. 被引量:9
-
9杨泽雪,郝忠孝.受限空间连接查询及代价分析[J].哈尔滨工业大学学报,2012,44(11):118-122. 被引量:1
-
10masepu.3389自动入侵思路探讨及工具编写[J].黑客防线,2010(7):97-98.