期刊文献+

Intrusion response goals and corresponding strategies 被引量:1

Intrusion response goals and corresponding strategies
下载PDF
导出
摘要 The effects of strategy on the network security defense and the related research on intrusion response strategy are briefly presented, with the focus on the status and function of intrusion re- sponse strategy in the intrusion response decision-making. Some specific response strategies for specific response goals are presented as well. The relevant knowledge of the planning, and a classification of response tasks are proposed. The intrusion response planning methods and models based on hierarchical task network (HTN) are described in detail. On this basis, the model of combining the response measure decision-making with the response time decision-making is expounded. The proposed model can integrate response strategy into response decision-making mechanism. In addition, the results of the intrusion response experiments are provided to verify the ability of using different response strategies to achieve different response goals. At last, the application needs of response strategy in network security are analyzed, and the approaches of the response strategy applied in in- trusion response system are summarized. The effects of strategy on the network security defense and the related research on intrusion response strategy are briefly presented, with the focus on the status and function of intrusion re- sponse strategy in the intrusion response decision-making. Some specific response strategies for specific response goals are presented as well. The relevant knowledge of the planning, and a classification of response tasks are proposed. The intrusion response planning methods and models based on hierarchical task network (HTN) are described in detail. On this basis, the model of combining the response measure decision-making with the response time decision-making is expounded. The proposed model can integrate response strategy into response decision-making mechanism. In addition, the results of the intrusion response experiments are provided to verify the ability of using different response strategies to achieve different response goals. At last, the application needs of response strategy in network security are analyzed, and the approaches of the response strategy applied in in- trusion response system are summarized.
出处 《Journal of Beijing Institute of Technology》 EI CAS 2012年第2期185-191,共7页 北京理工大学学报(英文版)
关键词 intrusion response strategy intrusion response decision-making intrusion detection hierarchical task network planning network security intrusion response strategy intrusion response decision-making intrusion detection hierarchical task network planning network security
  • 相关文献

参考文献1

二级参考文献11

  • 1穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 2Mu Chengpo,Huang Houkuan,Tian Shengfeng.Intrusion detection alert verification based on multi-level fuzzy comprehensive evaluation[C]//LNAI 3801:Proc of 2005 Int Conf on Computational Intelligence and Security.Berlin:Springer,2005:9-16.
  • 3ISO/IEC.Common Criteria for Information Technology Security Evaluation (CC),V2.1[OL].1999[2009-09-20].http://www.commoncriteria.org.
  • 4Stephen S Yau,Zhang Xinyu.Computer network intrusion detection assessment and prevention based on security dependency relation[C]//Proc of COMPSAC99.Los Alamitos,CA:IEEE Computer Society,1999:86-91.
  • 5Porras P A,Fong M W.Valdes A.A mission-impact-based approach to INFOSEC alarm correlation[C]//Proc of the 5th Int Symp on Recent Advances in Intrusion Detection.Berline:Springer,2002:95-114.
  • 6Ourston D,Matzner S,Stump W,et al.Coordinated Internet attacks:Responding to attack complexity[J].Journal of Computer Security,2004,12(2):165-190.
  • 7Boyer S,Dain O,Cunningham R.Stellar:A fusion system for scenario construction and security risk assessment[C]//Proc of the 3rd IEEE Int Workshop on Information Assurance.Los Alamitos,CA:IEEE Computer Society,2005:105-116.
  • 8Mu C P,Li X J,Huang H K,et al.Online risk assessment of intrusion scenarios using D-S evidence theory[C]// LNCS 5283:Proc of the 13th European Symp on Research in Computer Security.Berline:Springer,2008:35-48.
  • 9Bass T,Robichaux R.Defence-in-depth:Qualitative risk analysis methodology for complex network centric operation[C]//Proc of IEEE Military Communications Conf.Piscataway,NJ:IEEE,2001:64-70.
  • 10McCabe B,Ford D.Using belief networks to assess risk[C] //Proc of the 2001 Winter Simulation Conf.Washington DC:IEEE Computer Society,2001:1541-1546.

共引文献7

同被引文献14

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部