期刊文献+

安全事件的本体建模与检测 被引量:1

Ontological Modeling and Detection of Security Events
下载PDF
导出
摘要 目前安全事件知识表达各异,严重影响了安全事件的知识共享及检测。本文应用本体论,从时间、空间、功能三个不同维度对安全事件的要素以及安全事件特征、关系进行分析,建立了安全事件本体,并实现了安全事件检测模型。 Different knowledge representations of security events have serious impacts on knowledge sharing and events detection. With ontology technology, the paper analyzes the elements, features and relationships of security events from temporal, spatial and functional dimensions, presents security events ontology and implements a security events detection model.
出处 《微计算机信息》 北大核心 2008年第21期40-42,共3页 Control & Automation
基金 国家部委基金项目(20021823)
关键词 安全事件 本体 检测 Security events Ontology Detection
  • 相关文献

参考文献8

  • 1B Schneier. Attack trees, modeling security threats. Dr Dobb's Journal of Software Tools,1999,24(12):21-29
  • 2J.McDermott, Attack Net Penetration Testing, Proc.2000 New Security Paradigms Workshop, ACM Press, 2000,15 -22.
  • 3FEIERTAG R,KAHN C,PORRAS P, et al. A Common Intrusion Specification Language [EB/OL].http://www.isi.edu/brian/ci -df/ drafts/language.txt, 1999 -06.
  • 4F Cuppens , R Ortalol Lambda : A language to model database of detection of attacksl In : Proc of the 3rd Int'l Workshop on the Recent Advances in Intrusion Detection , LNCS 19071 New York : Springer, 2001 197-216
  • 5Undercoffer J,JOSH I A, Pinkston J. Modeling Computer Attacks: An Ontology for Intrusion Detection [A ]. Proceedings of RAID 2003, LNCS 2820 [C ], 2003.113-135.
  • 6张玉强.基于数据挖掘和本体的实时入侵检测系统[J].微计算机信息,2006,22(07X):142-144. 被引量:6
  • 7S. Kumar. Classification and Detection of Computer Intrusions. PhD thesis, Department of Computer Science, Purdue University, West Lafayette, Indiana, 1995.
  • 8经小川,胡昌振,谭惠民.本体论在网络入侵检测技术中的应用[J].四川大学学报(工程科学版),2005,37(3):105-109. 被引量:4

二级参考文献10

  • 1刘国华.基于数据挖掘的入侵检测规则生成模型研究[J].情报科学,2004,22(8):995-997. 被引量:2
  • 2龙银香.基于移动计算的数据挖掘研究[J].微计算机信息,2005,21(4):216-217. 被引量:12
  • 3陆汝钤.世纪之交的知识工程与知识科学[M].北京:清华大学出版社,2001..
  • 4Vern P.Bro:a system for detecting network intruders in realtime[A]. USENIX Security Symposium, San Antonio,TX,1998.202~211
  • 5Undercoffer J,Joshi A.A modeling computer attacks[J].The Knowledge Engineering Review,2001,8(3):221~241.
  • 6Neches R,Fikes R E,Gruber T R,et al,Enabling Technology for Knowledge Sharing. AI Magazine,1991,12(3) :36-56
  • 7Gruber T R.A Translation Approach toPortable Ontology Specifications.Knowledge Acquisition, 1993,5:199-220
  • 8Borst WN. Construction of Engineering Ontologied for Kowledge Sharing and Reuse. PhD thesis,Universtity of Twente,Enschede,1997
  • 9Heady R, Luger G, Maccabe A, et al. The Architecture of a Network Level Intrusion Detection System.Technical Report CS90-20, Department of Computer Science, University of New Mexico 1990-08
  • 10邓志鸿,唐世渭,张铭,杨冬青,陈捷.Ontology研究综述[J].北京大学学报(自然科学版),2002,38(5):730-738. 被引量:765

共引文献8

同被引文献5

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部