期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Boosting performance in attack intention recognition by integrating multiple techniques 被引量:2
1
作者 Hao Bai (1) david_xiaobai@126.com Kunsheng Wang (2) Changzhen Hu (1) Gang Zhang (2) Xiaochuan Jing (2) 《Frontiers of Computer Science》 SCIE EI CSCD 2011年第1期109-118,共10页
Recognizing attack intention is crucial for security analysis. In recent years, a number of methods for attack intention recognition have been proposed. However, most of these techniques mainly focus on the alerts of ... Recognizing attack intention is crucial for security analysis. In recent years, a number of methods for attack intention recognition have been proposed. However, most of these techniques mainly focus on the alerts of an intrusion detection system and use algorithms of low efficiency that mine frequent attack patterns without reconstructing attack paths. In this paper, a novel and effective method is proposed, which integrates several techniques to identify attack intentions. Using this method, a Bayesian-based attack scenario is constructed, where frequent attack patterns are identified using an efficient data-mining algorithm based on frequent patterns. Subsequently, attack paths are rebuilt by recorrelating frequent attack patterns mined in the scenario. The experimental results demonstrate the capability of our method in rebuilding attack paths, recognizing attack intentions as well as in saving system resources. Specifically, to the best of our knowledge, the proposed method is the first to correlate complementary intrusion evidence with frequent pattern mining techniques based on the FP-Growth algorithm to rebuild attack paths and to recognize attack intentions. 展开更多
关键词 attack path attack intention compensatoryintrusion evidence FP-GROWTH
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部