期刊文献+

一种代价估算规则在入侵响应系统中的应用

COST-BASED ADAPTIVE INTRUSION RESPONSE SYSTEM
下载PDF
导出
摘要 代价估算问题是入侵响应中成本分析的重要依据,因此也是影响入侵响应系统是否做出响应决策的关键问题.作者在分析了现有Northcutt的损失代价估算方法并对其代价估算规则进行了总结的基础上,提出了一种新的代价估算准则,并将基于该代价准则的成本分析模块应用到入侵响应系统中设计了基于成本分析的入侵响应系统,进而对该响应系统进行了损失代价估算、响应代价的估算,结果表明该项应用能够合理有效的利用有限的系统资源. Evaluation of the cost is the important base of the cost-sensitive in the intrusion response system,so it is also the critical point for making a response determination in intrusion response system.After analyzing existing the cost evaluation method——Northcutt and summarizing its rules,this paper presents a new cost revaluation rule which could be applied to the cost-sensitive model in the intrusion response system,and estimate this system about loss cost revaluation and response cost revaluation.Then it conclude that this application can make full use of the limited resources efficiently and rationally in the system from the result of comparison and analysis.
出处 《陕西科技大学学报(自然科学版)》 2009年第5期110-113,共4页 Journal of Shaanxi University of Science & Technology
关键词 代价估算 成本分析 入侵响应 cost evaluation cost-sensitive intrusion response
  • 相关文献

参考文献4

二级参考文献44

  • 1Wadlow T A.网络安全实施方法[M].北京:人民邮电出版社,2000-10..
  • 2蔡曙山.形式逻辑[M].北京:北京经济出版社,1987.120-138.
  • 3NorthcuttS 余青霓.网络入侵检测系统分析员手册[M].北京:人民邮电出版社,2000.21-38.
  • 4刘宗口 刘莹.Web站点安全与防火墙技术[M].北京:机械工业出版社,1998.47-50.
  • 5Wu Jie .Distributed System Design[M].American: CRC Press LLC,1999.
  • 6Ryan J, Lin M J, Mikkulainen R. Intrusion Detection in Neural Networks[A]. Advance in Neural Intbrmation Processing Systems 10(NIPS97), MIT Press, Cambridge, MA, 1998.
  • 7Ioannidis S, Keromytis A D, Bellovin S M, et al. Implementing a Distributed Firewall[A]. In Proceedings of Computer and Communications Security (CCS) 2000,2000-11: 19-99.
  • 8Debar H, Dacier M, Wespi A. Toward a Taxonomy of Intrusion Detection Systems[J]. Computer Networks, 1999, (31) : 805-822.
  • 9Lee W, Park C, Stoltb S J. Toward Automatic Intrusion Detection Using NFR[A]. California: USA, 1999-04.
  • 10Carver C A. Limiting Uncertainty in Intrusion Response. IEEE,2000.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部