期刊文献+

基于蜜罐的入侵检测系统的博弈分析与设计 被引量:2

Analysis and Design of Game Theory in Intrusion Detection System Based on Honey-pot
原文传递
导出
摘要 论文从博弈论的角度,对引入蜜罐技术的入侵检测系统进行了架构分析和模块分析,并对一般的入侵和入侵检测行为进行了描述,最后提出了入侵检测中博弈过程模型。 In the light of Game Theory, this paper analyzes the modules and structures of Intrusion Detection System based on honey-pot. Analysis is also focused on general intrusion and intrusion detection activity. It also describes a modes of decision-making process based on Game Theory in an information rivalry.
出处 《信息安全与通信保密》 2007年第12期94-95,98,共3页 Information Security and Communications Privacy
基金 863基金项目:2006AA01Z403(基于可执行代码逆向分析的软件漏洞挖掘与管控技术)
关键词 蜜罐 入侵检测 博弈 honey pot intrusion detection game theory
  • 相关文献

参考文献4

二级参考文献11

  • 1Lye Kong-wei, Wing Jeannette M. Game Strategies In Network Security [J]. http://www-2.cs.cmu.edu/-wing/publications/CMU-CS-02-136. pdf.
  • 2David Burke. Towards a game theory model of information warfare[J]. Master's thesis, Graduate School of Engineering and Management, Airforce Institute of Technology, Air University,1999.
  • 3Jha S, Sheyner O, Wing J. Minimization and reliability analyses of attack graphs [J]. Carnegie Mellon University Technical Repor tCS-02-109, 2002.
  • 4Denning D.An intrusion-detection model[J].IEEE Trans on Software Engineering.1987,13(2):222-232.
  • 5Guillermo Owen;Game Theory[M].Academic Press,New York.1.2,p1
  • 6Battigalli,Pierpaolo;Rationalizability in infinite,dynamic games with incomplete information[J].Research in Economics,March,2003,57(1):1-38.
  • 7Drew Fudenberg,Jean Tirole.Game theory[M].Beijing,China Renmin University Press,288-293.
  • 8Animesh Patcha,Jung-Min Park.A game theoretic approach to modeling intrusion detection in mobile ad hoc networks[D].United States Military Academy,West Point,NY,June 2004,10-11.
  • 9Huadong Wu,Siegel M.Ablay S.Sensor fusion using dempster-shafer theory II:static weighting and Kalman filter-like dynamic weighting[A].Instrumentation and Measurement Technology Conference[C].2003.IMTC'03.Proceedings of the 20th IEEE,20-22 May 2003,2:907-912.
  • 10Kari Sentz,Scott Ferson.Combination of evidence in dempster-shafer theory[Z].SAND 2002-0835 Unlimited Release Printed April 2002.

共引文献4

同被引文献19

  • 1梁昇,肖宗水,许艳美.基于统计的网络流量异常检测模型[J].计算机工程,2005,31(24):123-125. 被引量:17
  • 2Hayatle O,Otrok H,Youssef A.A Game Theoretic Investigation for High Interaction Honeypots[C]// Communications(ICC),2012 IEEE Intemational Conference on.USA:IEEE,2012:6662-6667.
  • 3Wagener Q Dulaunoy A,Engel T.Self Adaptive High Interaction Honeypots Driven by Game Theory[J].Lecture Notes in Computer Science(S0302-9743),2009,5873(11):741-755.
  • 4Pibil R,Lisy V,Kiekintveld C,et al.Game theoretic model of strategic honeypot selection in computer networks[M]// Decision and Game Theory for Security.Germany:Springer Berlin Heidelberg,2012:201-220.
  • 5Wei L,Wang X.Research on honeypot information fusion based on game theory[C]// Computer Research and Development,2010 Second Intemational Conference on.USA:IEEE,2010:803-806.
  • 6Li H,Yang X,Qu L.On the offense and defense game in the network honeypot[M]// Advances in Automation and Robotics,Germany:Springer Berlin Heidelberg.2012,2:239-246.
  • 7Cai J,Yegneswaran V,Alfeld C.Honey games:a game theoretic approach to defending network monitors[J].Journal of Combinatorial Optimization(SI382-6905),2011,22(8):305-324.
  • 8Garg N,Grosu D.Deception in honeynets:A game-theoretic analysis[C]// Proceedings of IEEE Information Assurance and Security Workshop,New York,USA.USA:IEEE,2007:20-22.
  • 9Pauna A.Improved self adaptive honeypots capable of detecting rootkit malware[C]// Communications (COMM),20129th Intemational Conference on.USA:IEEE,2012:281-284.
  • 10Carroll T E,Grosu D.A game theoretic investigation of deception in network security[J].Security and Communication Networks(S1939-0114),2011,4(10):1162-1172.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部