期刊文献+

基于因果关系的网络安全事件传导路径分析方法 被引量:1

The Analysis of Internet Security Events Propagation Path based on Causality
在线阅读 下载PDF
导出
摘要 网络安全事件在发展过程中,形成了网状的传导路径。文章提出一种基于因果关系的相似度分析方法,分析网络安全事件的传导路径。文章首先介绍了安全事件的因果关系,然后提取告警属性信息作为参数,分析其相似度并根据结果确定事件的传导路径,为进一步分析安全事件并采取相应对策提供依据。 Interact security events would form a network of propagation path in the process of development. In this paper we present a similarity analysis method based on causality, to analyze the propagation path of the security events. Firstly, we introduced the causation of the security events, then take the attribute value of the alarm information as a parameter, analyze the similarity and determine the conduction path of events according to the results, provide basis for further analysis of security event and adopt corresponding countermeasures
出处 《信息网络安全》 2013年第5期35-37,共3页 Netinfo Security
关键词 网络安全事件 因果关系 传导路径 intemet security events causality propagation path
  • 相关文献

参考文献4

二级参考文献17

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 3PDNS-Parallel/Distributed NS. 2004, http://www.cc.gatech.edu/ computing/2004.
  • 4Hongsuda T, Ramesh G, Sugih J. Network Topology Generators: Degreebased Vs. Structural Proc of SIGCOMM,Pittsburgh,Pennsylvania,USA. 2002.
  • 5Cheung S, Lindqvist Ulf. Modeling multistep cyber attacks for scenario recognition[A]. DARPA Information Survivability Conference and Exposition (DISCEX Ⅲ)[C]. Washington D C: IEEE Computer Society Press, 2003.284-292.
  • 6Porras P A, Fong M W, Valdes A. A mission-impact-based approach to INFOSEC alarm correlation[A]. Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID) 2002[C]. Zurich Switzerland: Springer Verlag, 2002.95-115.
  • 7Goldman R P, Heimerdinger W. Information modeling for intrusion report aggregation[A]. Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX Ⅱ) 2001[C]. Anaheim: IEEE Computer Society Press, 2001.329-342.
  • 8Valdes A, Skinner K. Probabilistic alert correlation[A]. Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID) 2001[C]. Davis: Springer Verlag, 2001.54-68.
  • 9Debar H, Wespi A. Aggregation and correlation of intrusion-detection alerts[A]. Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID) 2001[C]. Davis: Springer Verlag, 2001.85-103.
  • 10Templeton S J, Levitt K. A requires/provides model for computer attacks[A]. Proceedings of the New Security Paradigms Workshop 2000[C]. Cork Ireland: ACM Press, 2000.31-38.

共引文献171

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部