期刊文献+

入侵事件建模研究

Study of Intrusion Events Modeling
下载PDF
导出
摘要 入侵过程由一系列入侵行为组成,每个入侵行为包含一个或多个入侵事件,这些事件间可能存在各种各样的关系。该文对入侵事件特征进行研究,从检测角度对入侵事件进行分类。定义了入侵事件,建立了入侵事件的一般模型。从时间、空间和功能方面分析了事件间的内在联系,并依据这些关系建立了入侵事件逻辑、统计和模糊模型,以描述不同的入侵行为,并举实例予以分析。 Intrusion process consists of a series of intrusion behavior, which comprises one or some intrusion events. There are various relations among these intrusion events. Intrusion characteristic is studied, and intrusion events are classified by those aspects of intrusion. By defining intrusion event, common model of intrusion events is established. Based on analysis of time relations, space relations and function relations among intrusion events, the logical model, statistical model and fuzzy model are established. With these models, intrusion behavior can be represented. And it is testified by instance.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第9期151-153,共3页 Computer Engineering
基金 军械工程学院创新人才科研启动基金资助项目
关键词 入侵事件 事件关系 事件模型 intrusion events event relation event model
  • 相关文献

参考文献3

  • 1Sekar R,Verma S,Shanbhag T,et al.A High-performance Network Intrusion Detection Sysmm[C]//Proc.of the 6th ACM Symposium on Computer and Communications Security.Berlin,Germany:Springer,1999:8-17.
  • 2陈晓苏,尹宏斌,肖道举.入侵检测中的事件关联分析[J].华中科技大学学报(自然科学版),2003,31(4):30-33. 被引量:12
  • 3Liu G,Mok A K.Composite Events for Network Event Correlation[C]//Proc.of IFIP/IEEE International Symposium on Integrated Network Management.New York,USA:IEEE Press,1999:247-260.

二级参考文献2

  • 1[1]Poirk Y. Event Correlation. IEEE Potentials, 2001,20(2): 34~35
  • 2[2]Ye Nong, Li Xiaoyang, Chen Qiang, et al. Probabilistic techniques for intrusion detection based on computes audit data. IEEE Transactions on System, Man, and Cybernetics, 2001, 31(4): 266~274

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部