期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Intrusion response goals and corresponding strategies 被引量:1
1
作者 穆成坡 韩操正 帅冰 《Journal of Beijing Institute of Technology》 EI CAS 2012年第2期185-191,共7页
The effects of strategy on the network security defense and the related research on intrusion response strategy are briefly presented, with the focus on the status and function of intrusion re- sponse strategy in the ... The effects of strategy on the network security defense and the related research on intrusion response strategy are briefly presented, with the focus on the status and function of intrusion re- sponse strategy in the intrusion response decision-making. Some specific response strategies for specific response goals are presented as well. The relevant knowledge of the planning, and a classification of response tasks are proposed. The intrusion response planning methods and models based on hierarchical task network (HTN) are described in detail. On this basis, the model of combining the response measure decision-making with the response time decision-making is expounded. The proposed model can integrate response strategy into response decision-making mechanism. In addition, the results of the intrusion response experiments are provided to verify the ability of using different response strategies to achieve different response goals. At last, the application needs of response strategy in network security are analyzed, and the approaches of the response strategy applied in in- trusion response system are summarized. 展开更多
关键词 intrusion response strategy intrusion response decision-making intrusion detection hierarchical task network planning network security
下载PDF
Multi-agent cooperative intrusion response in mobile adhoc networks 被引量:6
2
作者 Yi Ping Zou Futai +1 位作者 Jiang Xinghao Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期785-794,共10页
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s... The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. 展开更多
关键词 computer networks SECURITY mobile agent mobile adhoc networks intrusion detection intrusion response
下载PDF
A Data Intrusion Tolerance Model Based on an Improved Evolutionary Game Theory for the Energy Internet
3
作者 Song Deng Yiming Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第6期3679-3697,共19页
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suf... Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources. 展开更多
关键词 Energy Internet intrusion tolerance game theory racial competition adaptive intrusion response
下载PDF
Risk assessment framework for power control systems with PMU-based intrusion response system 被引量:12
4
作者 Jie YAN Manimaran GOVINDARASU +2 位作者 Chen-Ching LIU Ming NI Umesh VAIDYA 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2015年第3期321-331,共11页
Cyber threats are serious concerns for power systems.For example,hackers may attack power control systems via interconnected enterprise networks.This paper proposes a risk assessment framework to enhance the resilienc... Cyber threats are serious concerns for power systems.For example,hackers may attack power control systems via interconnected enterprise networks.This paper proposes a risk assessment framework to enhance the resilience of power systems against cyber attacks.The duality element relative fuzzy evaluation method is employed to evaluate identified security vulnerabilities within cyber systems of power systems quantitatively.The attack graph is used to identify possible intrusion scenarios that exploit multiple vulnerabilities.An intrusion response system(IRS)is developed to monitor the impact of intrusion scenarios on power system dynamics in real time.IRS calculates the conditional Lyapunov exponents(CLEs)on line based on the phasor measurement unit data.Power system stability is predicted through the values of CLEs.Control actions based on CLEs will be suggested if power system instability is likely to happen.A generic wind farm control system is used for case study.The effectiveness of IRS is illustrated with the IEEE 39 bus system model. 展开更多
关键词 Cyber security Supervisory control and data acquisition(SCADA) Risk assessment intrusion response system(IRS) Conditional Lyapunov exponents(CLEs) Phasor measurement unit(PMU) Voltage instability
原文传递
An Attack Modeling Based on Colored Petri Net
5
作者 周世杰 秦志光 +1 位作者 张峰 刘锦德 《Journal of Electronic Science and Technology of China》 2004年第1期47-52,共6页
A color petri net (CPN) based attack modeling approach is addressed. Compared with graph-based modeling, CPN based attack model is flexible enough to model Internet intrusions, because of their static and dynamic feat... A color petri net (CPN) based attack modeling approach is addressed. Compared with graph-based modeling, CPN based attack model is flexible enough to model Internet intrusions, because of their static and dynamic features. The processes and rules of building CPN based attack model from attack tree are also presented. In order to evaluate the risk of intrusion, some cost elements are added to CPN based attack modeling. This extended model is useful in intrusion detection and risk evaluation. Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions, such as intrusion response and intrusion defense. A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn’t. 展开更多
关键词 petri net color petri net (CPN) intrusion detection and response attack modeling
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部