Research of Automatic Recognition Double Layers Intrusion Intention Algorithm Based on Attack Graph

作者: Wang Guangze , Wang Peng , Luo Zhiyong , Zhu Suxia

DOI: 10.14257/IJSIA.2016.10.3.17

关键词:

摘要: The determination of network equipment weaknesses and the discovery intrusion intention is one difficulties that troubled security management personnel. Based on previous studies, further proposed a double attack graph based domainequipment. By underlying topology data collected analyzed, using Bayesian theory to complete quantify for generation strategy in minimal power key set, with cost calculation automatic recognition topology, we provide an important basis maintenance. Experimental results show measure quantitative domainequipment recognize not only effective feasible, but also has feature easy promotion.

参考文章(9)
Sebastian Roschke, Feng Cheng, Christoph Meinel, A new alert correlation algorithm based on attack graph computational intelligence and security. pp. 58- 67 ,(2011) , 10.1007/978-3-642-21323-6_8
Sudhakar Govindavajhala, Xinming Ou, Andrew W. Appel, MulVAL: a logic-based network security analyzer usenix security symposium. pp. 8- 8 ,(2005)
Richard Lippmann, Kyle Ingols, Chris Scott, Keith Piwowarski, Kendra Kratkiewicz, Mike Artz, Robert Cunningham, Validating and Restoring Defense in Depth Using Attack Graphs military communications conference. pp. 981- 990 ,(2006) , 10.1109/MILCOM.2006.302434
Wenlin Yao, Lei Wang, Lingling Gao, An ungreedy Chinese deterministic dependency parser considering long-distance dependency international conference natural language processing. pp. 1- 5 ,(2008) , 10.1109/NLPKE.2008.4906818
Cynthia Phillips, Laura Painton Swiler, None, A graph-based system for network-vulnerability analysis new security paradigms workshop. pp. 71- 79 ,(1998) , 10.1145/310889.310919
O. Sheyner, J. Haines, S. Jha, R. Lippmann, J.M. Wing, Automated generation and analysis of attack graphs ieee symposium on security and privacy. pp. 273- 284 ,(2002) , 10.1109/SECPRI.2002.1004377
XJ Chen, BX Fang, QF Tan, H Zhang, Inferring Attack Intent of Malicious Insider Based on Probabilistic Attack Graph Model Chinese Journal of Computers. ,(2014)
Yao Shuping, Wang Zhigang, Peng Wu, Hu Changzhen, A Dynamic Intrusive Intention Recognition Method Based on Timed Automata Journal of Computer Research and Development. ,vol. 48, pp. 1288- ,(2011)