期刊文献+

CPN攻击建模及警报相关性算法设计 被引量:1

Attack modeling using colored petri net and alerts correlation algorithms design
下载PDF
导出
摘要 为提高当前入侵检测系统的预警质量和分析预测能力,用染色Petri网(colored petrinet,CPN)构造了攻击模型,系统性地设计了警报信息相关性分析算法。通过把'警报'和'攻击'作为2个不同实体参与模型运算,将目前主要采用的过滤观察信息为基础的关联方法提升为信息推理的演算方法。应用CPN模型转换、极小覆盖集命题等方法,对本领域中的难点问题即复合攻击、合作攻击进行了理论分析和算法设计。在此基础上开发了警报信息相关性分析(alerts correlation analysis system,ACAS)实验系统,实验结果表明算法系统对于提高入侵检测系统的警报质量和分析预测能力是可行、有效的。 In order to improve the alerts quality and prediction capability of traditional intrusion detection systems(IDS),the advanced alerts correlation algorithms are proposed,which is based on attack scenarios modeling using colored petri net(CPN).The current analysis approach information filtering is updated to messages logic deduction by reasoning under the model.The alert and the attack are converted to two different parameters for computation.By means of transforming CPN model and calculating the minimal covering set,the algorithms for multi-step attack and cooperative attack are designed.The experimental alerts correlation analysis system(ACAS) is programmed.That experiment results indicate that these algorithms could be applied to improve the alerts quality and prediction ability of IDS effectively.
出处 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第4期118-124,共7页 Journal of Chongqing University
基金 国家科技支撑计划资助项目(2008BAH37B04)
关键词 入侵检测 染色Petri网 攻击建模 警报相关性 合作攻击 intrusion detection petri net application attack modeling alerts correlation cooperative attack
  • 相关文献

参考文献15

  • 1JULISCH K, DACIER M. Mining intrusion detectionalarms for actionable knowledge [C]//The 8th ACM International Conference on Knowledge Discovery andData Mining, July 23 26, 2002, Edmonton, Alberta, Canada. New York: ACM, 2002: 366-375.
  • 2CUPPENS F, AUTREL F, BENFERHAT S, et al. Correlation in an intrusion detection process [C/OL]//Internet Security Communication Workshop, Tunis, September 29, 2002.. Computer Network Security [2003]. http://www, lsv. ens cachan, fr/-goubault/ SECI-02/Final/actes-seci02/pdf/014-cuppens. pdf.
  • 3YU D, FRINCKE D. Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri Net [J]. Computer Networks, 2007, 5(3): 632-654.
  • 4NING P, XU D B, HEALEY C G, et al. Building attack scenarios through integration of complementary alert correlation methods [C]//The llth Annual Network and Distributed System Security Symposium.(NDSS 2004). IS. 1.7:IEEE, 2004:97 111.
  • 5CHEUNC- S. LINDQVIST U, FONG M W. Modeling multi step cyber attacks for scenario reeognition[C]//The 3rd DARPA Information Survivability Conference and Exposition ( DISCEX III), April 22 24, 2003,Washington D. C. Washington: IEEE Computer Society Press. 2003(1): 284 292.
  • 6严芬,黄皓,殷新春.基于CTPN的复合攻击检测方法研究[J].计算机学报,2006,29(8):1383-1391. 被引量:17
  • 7FRINCKE D, TOBIN D, HO Y. Planning petri netsand intrusion detection [ C ],//The 21st National Information Systems Security Conference (NISSC ' 98), 1998, Crystal City, Virginia. FS. 1. J.. IEEE Computer Society, 2006.
  • 8鲍旭华,戴英侠,冯萍慧,朱鹏飞,魏军.基于入侵意图的复合攻击检测和预测算法[J].软件学报,2005,16(12):2132-2138. 被引量:40
  • 9II.GUN K, KEMMERERER R, PORRAS P. Statetransition analysis: a rule-based intrusion detection system [J]. IEEE Transactions on Software Engineering, 1995, 21(3): 181-199.
  • 10HARRIS J W, STOCKER H. Maximum likelihood method: handbook of Mathematics and computational science [M]. New York: Springer-Verlag, 1998: 824-827.

二级参考文献26

  • 1薛静锋,曹元大.Petri网在IDS中的应用研究[J].计算机工程,2004,30(15):117-119. 被引量:3
  • 2鲍旭华,戴英侠,冯萍慧,朱鹏飞,魏军.基于入侵意图的复合攻击检测和预测算法[J].软件学报,2005,16(12):2132-2138. 被引量:40
  • 3Anderson JP. Computer security threat monitoring and surveillance. Technical Report, Contract 79F26400. Fort Washington,Pennsylvania, James P. Anderson Company, 1980.
  • 4Mukherjee B, Heberlein LT, Levitt KN. Network intrusion detection. IEEE Network, 1994,8(3):26-41.
  • 5Bace RG. Intrusion Detection. Macmillan Technology Publishing, 2000.
  • 6Ilgun K, Kemmerer RA, Porras PA. State transition analysis: A rule-based intrusion detection approach. IEEE Trans, on Software Engineering, 1995,21(3):181-199.
  • 7Vigna G, Kemmerer RA. NetSTAT: A network-based intrusion detection system. Journal of Computer Security, 1999,7(1):37-71.
  • 8Porras PA, Neumann PG. EMERALD: Event monitoring enabling response to anomalouslive disturbances. In: Proc. of the 20th National Information Systems Security Conf. National Institute of Standards and Technology, 1997.353-365.
  • 9Cheung S. Lindqvist U, Fong MW. Modeling multistep cyber attacks for scenario recognition. In: Proc. of the 3rd DARPA Information Survivability Conf. and Exposition (DISCEX Ⅲ), Washington: IEEE computer Society Press. Vol I, 2003.284-292.
  • 10Cuppens F, Miège A. Alert correlation in a cooperative intrusion detection framework. In: Proc. of the 2002 IEEE Symp. on Security and Privacy (S&P 2002). 2002. 202-215.

共引文献51

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部