期刊文献+

基于语义攻击树的安全事件建模与分析

Semantic Attack Tree-Based Security Events Modeling and Analysis
下载PDF
导出
摘要 本文在安全事件的时间语义及上下文语义关系分析的基础上,建立语义攻击树模型,提出了增强非确定有限树自动机处理策略及其算法,并建立了事件检测系统框架。 Based on the analysis of temporal and context relationships of security events, the paper implements semantic tree model, presents an enhanced nondeterministic tree automata processing policy and algorithm ,and constructs a system framework of event detection.
出处 《微计算机信息》 北大核心 2008年第15期55-57,共3页 Control & Automation
基金 国家部委基金项目(20021823)
关键词 语义攻击树 安全事件 树自动机 Semantic attack tree Security event Tree automata
  • 相关文献

参考文献8

  • 1Schneier, B. Modeling security threats. Dr. Dobb's Journal. http: //www.schneier.com/paper-attacktrees-ddjft.html. 1999.
  • 2Andrew P. Moore, Robert J. Ellison, Richard C. Linger. Attack Modeling for Information Security and Survivability. Technical Note, CMU/SEI-2001-TN-001,2001,3, http://www.cert.org/archive/ pdf/01tn001.pdf.
  • 3Kristopher Daley,Ryan Larson, Jerald Dawkins. A Structural Framework for Modeling Multi-Stage Network Attacks. Proceedings of International Conference on Parallel Processing Workshops,2002.
  • 4Allen J F, Ferguson G. Actions and events in interval temporal logic. Journal Logic and Computation, 1994. 4,5: 531-579.
  • 5徐辉,冯晋雯,潘爱民.一种时间场景识别算法及其在安全报警熔合中的应用[J].北京大学学报(自然科学版),2005,41(3):448-459. 被引量:1
  • 6P. Ning, Y. Cui, and D. S. Reeves. Analyzing intensive intrusion alerts via correlation. In Proc. of the 5th Int'l Symposium on Recent Advances in Intrusion Detection (RAID 2002), October 2002.
  • 7邓琦皓,吕晓斌,罗军勇.基于入侵行为模式的告警关联[J].微计算机信息,2005,21(10X):8-10. 被引量:6
  • 8Hubert Comon, Max Dauchet, Remi Gilleron, etc. Tree Automata Techniques and Application, http://www.gmppa.univ-lille3.fr/tata/tata.pdf.

二级参考文献15

  • 1徐晋晖,毛希平,刘桂霞,石纯一.面向常识的时间推理[J].软件学报,2000,11(6):809-815. 被引量:14
  • 2A.Valdes and K.Skinner. probabilistic Alert Correlation [C]. In Fourth International Worshop on the Recent Advances in Itrusion Detection(RAID' 2001),Davis,USA,Oct 2001.
  • 3P.Ning, D.Reeves,and Yun Cui. Correlating Alerts Using Prerequisites of Intrusions. Technical Report TR-2001-13, North Carolina State University,Department of Computer Science, Dec 2001.
  • 4Klaus Julisch. Clustering Intrusion Detection Alarms to Support Root Cause Analysis. ACM Transactions on Information and System Security. November 2003,6(4):443-471.
  • 5Cuppens F,Autrel F, Miège et S A. Benferhat. Correlation in an Intrusion Detection Process. Internet Security Communication Workshop (SECI'02), Tunis, Tunisie, 2002.
  • 6Morin B, Debar H. Correlation of Intrusion Symptoms: an Application of Chronicles. In Proceedings of 6th International Conference on Recent Advances in Intrusion Detection (RAID'03), Carnegie Mellon University, Pittsburg, 2003,94-113.
  • 7Dousson C. Alarm Driven Supervision for Telecommunication Networks : Online Chronicle Recognition. Annales des Telecommunications, 1996: 501-508.
  • 8Allen J. Maintaining Knowledge about Temporal Intervals. Communication of the ACM, 1983,26(11): 832-843.
  • 9Vilain M, Kautz H. Constraint Propagation Algorithms for Temporal Reasoning. In: Kehler T, Rosenschein S et al eds. Proceedings of the 5^th National Conference on Artificial Intelligence. San Mateo,: Morgan Kaufmann Publishers Inc, 1986:377-382.
  • 10Meiri I. Combining Qualitative and Quantitative Constraints in Temporal Reasoning. Artificial Intelligence, 1996, 87(2): 343-385.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部