期刊文献+

基于规划识别的入侵检测研究 被引量:3

Research on the Intrusion Detection Based on Plan Recognition
下载PDF
导出
摘要 规划识别是人工智能的重要研究分支之一,在入侵检测领域中已有初步的应用。本文在介绍规划识别和入侵检测基本概念的基础上,按照规划识别方法分门别类地研究了基于事件层的规划识别、基于贝叶斯网络的规划识别、基于扩展目标规划图的规划识别、彩色Petri网、对手规划、行为状态图等在入侵检测领域的应用现状和进展;接着深入分析了规划识别和入侵检测的关系和相似之处;最后讨论了基于规划识别的入侵检测存在的问题,并指出了未来的发展趋势。本文综述了智能规划在入侵检测中应用的关键技术和存在的问题,研究内容对于相关人员从事入侵检测研究具有重要的参考价值。 Plan recognition is one of the important branches of artificial intelligence,and it has been preliminarily applied in intrusion detection systems(IDSs).The fundamental conception of plan recognition and IDS are introduced firstly.And then it studies on the applications and progresses of plan recognition in IDS according to the classification of plan recognizing methods,such as plan recognition based on event,plan recognition based on the Bayesian network,plan recognition based on the extended goal graph,colored petri net,adversarial planning and action state diagram.Subsequently,the common characteristics of plan recognition and IDS are thorough analyzed.Finally,the development trends and the existing problems of this domain are discussed.This review deals with the key technology and the existing problems of plan recognition implicating in IDS,which is very helpful for the related personnel research in the logistics fields.
出处 《计算机工程与科学》 CSCD 北大核心 2010年第12期22-26,共5页 Computer Engineering & Science
基金 国家自然科学基金资助项目(60573067)
关键词 智能规划 规划识别 入侵检测 网络安全 intelligent planning plan recognition intrusion detection network security
  • 相关文献

参考文献23

二级参考文献175

  • 1鲍旭华,戴英侠,冯萍慧,朱鹏飞,魏军.基于入侵意图的复合攻击检测和预测算法[J].软件学报,2005,16(12):2132-2138. 被引量:40
  • 2韩毅,陈建,吕英华,谷文祥,张靖波.自组织神经网络在CRM中的应用[J].东北师大学报(自然科学版),2006,38(1):31-35. 被引量:4
  • 3任铮,陈志刚.基于数据挖掘和规划的智能网络入侵检测系统[J].计算机工程与科学,2006,28(3):5-7. 被引量:8
  • 4Forrest S., Hofmeyr S.A., Somayaji A., Longstaff T.A.. A sense of self for Unix processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1996, 120~128
  • 5Lee Wenke, Xiang Dong. Information-theoretic measures for anomaly detection. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA, 2001, 130~143
  • 6Lane T., Brodley C.E.. Temporal sequence learning and data reduction for anomaly detection. In: Proceedings of the 5th ACM Conference on Computer & Communication Security, San Francisco, California, USA, 1998, 295~331
  • 7Goldman R.P., Geib C.W., Miller C.A.. A new model of plan recognition. In: Proceedings of the 1999 Conference on Uncertainty in Artificial Intelligence, Stockholm, Sweden, 1999, 245~254
  • 8Charniak E., Goldman R.. A Bayesian model of plan recognition. Artificial Intelligence, Elsevier Science Publishers. 1993, 64(1): 53~79
  • 9Albrecht R., Zukerman R., Nicholson A., Bud A.. Towards a Bayesian model for keyhole plan recognition in large domains. In: Proceedings of the 6th International Conference on User Modeling. Sardinia, Italy, 1997, 365~376
  • 10Wrn A., Stenborg O.. Recognizing the plans of a replanning user. In: Proceedings of the IJCAI95 Workshop on The Next Generation of Plan Recognition Systems: Challenges for and Insight from Related Areas of AI. Montreal, Canada, 1995, 113~118

共引文献276

同被引文献18

  • 1诸葛建伟,韩心慧,叶志远,邹维.基于扩展目标规划图的网络攻击规划识别算法[J].计算机学报,2006,29(8):1356-1366. 被引量:17
  • 2谷文祥,李丽,李丹丹.规划识别的研究及其应用[J].智能系统学报,2007,2(1):1-15. 被引量:8
  • 3谷文祥,李丽,蔡增玉.规划识别中误导动作的研究[J].计算机工程,2007,33(3):205-207. 被引量:1
  • 4Henry A, Kautz A. Formal theory of plan recognition [D]. Rochester: University of Rochester,1987.
  • 5Villain M. Getting serious about parsing plans: a grammatical analysis of plan recognition[C]. Proceeding of the 8th National Conference on Artificial Intelligence, Boston, 1990.
  • 6Charniak E, Goldman R P. A Bayesian model of plan recognition[J]. Artificial Intelligence, 1993,64 (1) :53-79.
  • 7Hong J. Graph Construction and Analysis as a paradigm for Plan Recognition[C]. Proceedings of the Seventeenth National Conference on Artificial Intelligence, Austin,2000.
  • 8Geib C W.Toward using plan recognition for intrusion detection.Pro- ceedings of the ICAPS workshop on intelligent security.Thessaloniki, Greece: ACM, 2009 : 46-55.
  • 9Kichkaylo T, Ryutov T, Orosz M D, et al.Planning to discover and counteract attacks.Informatica ( Slovenia ), 2010; 34 ( 2 ) : 159-168.
  • 10Chintabathina S, Villacis J, Walker J J, et al.Plan recognition in in- trusion detection systems using logic programming.Homeland Security ( HST), 2012 IEEE Conference on Technologies for.Waltham, MA, USA, 2012:609-'613.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部