期刊文献+

基于攻击路径图的入侵意图识别 被引量:5

Intrusive Intention Recognition Based on Attack Path Graph
下载PDF
导出
摘要 为了预测攻击者高层次的攻击目标,感知网络的安全态势,提出入侵意图识别方法.给出入侵意图的概念及其分类,提出一种基于层次化的攻击路径图.利用攻击路径图对攻击者的意图可达性、意图实现概率、意图实现的最短路径和攻击路径预测进行定量分析.应用有向图的最小割理论制定防护措施阻止攻击者意图的实现,为管理员的决策提供依据.实验验证了该方法的可行性和有效性. In order to predict an attacker’s high level goals and assess network security situation, an intrusive intention recognition method is presented in this paper. Concept and taxonomy of intrusive intention are introduced at first. Then, to reduce complexity of understanding and analysis, a method of hierarchical attack path graph generation is proposed to recognize intrusive intention. Based on the attack path graph, the algorithms for evaluating quantitatively intention accessibility, reliable probability, attack path prediction and possible minimum attack path are developed. Next, economical and effective protective measures are addressed to block attackers’ intention to be achieved, by applying minimum vertex cut set theory to directed graph. Finally several experiments are done to prove the feasibility and validity of this method.
出处 《北京理工大学学报》 EI CAS CSCD 北大核心 2010年第9期1077-1081,共5页 Transactions of Beijing Institute of Technology
基金 国家"八六三"计划项目(2009AA01Z433)
关键词 入侵意图识别 攻击路径图 最小割理论 intrusive intention recognition attack path graph minimum cut set theory
  • 相关文献

参考文献6

二级参考文献44

  • 1薛静锋,曹元大.Petri网在IDS中的应用研究[J].计算机工程,2004,30(15):117-119. 被引量:3
  • 2鲍旭华,戴英侠,冯萍慧,朱鹏飞,魏军.基于入侵意图的复合攻击检测和预测算法[J].软件学报,2005,16(12):2132-2138. 被引量:40
  • 3Anderson JP. Computer security threat monitoring and surveillance. Technical Report, Contract 79F26400. Fort Washington,Pennsylvania, James P. Anderson Company, 1980.
  • 4Mukherjee B, Heberlein LT, Levitt KN. Network intrusion detection. IEEE Network, 1994,8(3):26-41.
  • 5Bace RG. Intrusion Detection. Macmillan Technology Publishing, 2000.
  • 6Ilgun K, Kemmerer RA, Porras PA. State transition analysis: A rule-based intrusion detection approach. IEEE Trans, on Software Engineering, 1995,21(3):181-199.
  • 7Vigna G, Kemmerer RA. NetSTAT: A network-based intrusion detection system. Journal of Computer Security, 1999,7(1):37-71.
  • 8Porras PA, Neumann PG. EMERALD: Event monitoring enabling response to anomalouslive disturbances. In: Proc. of the 20th National Information Systems Security Conf. National Institute of Standards and Technology, 1997.353-365.
  • 9Cheung S. Lindqvist U, Fong MW. Modeling multistep cyber attacks for scenario recognition. In: Proc. of the 3rd DARPA Information Survivability Conf. and Exposition (DISCEX Ⅲ), Washington: IEEE computer Society Press. Vol I, 2003.284-292.
  • 10Cuppens F, Miège A. Alert correlation in a cooperative intrusion detection framework. In: Proc. of the 2002 IEEE Symp. on Security and Privacy (S&P 2002). 2002. 202-215.

共引文献60

同被引文献49

引证文献5

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部