期刊文献+

自动入侵响应系统的研究 被引量:11

A Study of Automated Intrusion Response Systems
在线阅读 下载PDF
导出
摘要 1.引言 随着计算机网络的不断发展和普及,安全问题日益严重,已成为当今研究的重点.从CERT每年的安全事件报告可以看出,安全事件的数量从1989年的6例上升到1999年的8268例[1],计算机网络的安全问题引起了广泛的关注. The emergence of automated and complex attacks imposes great threat on the network. The automated intrusion response system is able to take timely countermeasures to stop the attacks and decrease the loss of systems This paper analyzes the several requirements of an ideal automated intrusion response system, introduces the general architecture of automated intrusion response systems, summarizes the possible countermeasures that make the basis of the research, and focuses on the introduction of three important techniques, including cost-sensitive model, plan recognition, and the self-adaptive technique. The combination of these techniques helps to construct a reasonable, timely, and self-adaptive automated intrusion response system. In the end of this paper, we make a brief introduction of the cooperation techniques that is used in large scale networks.
出处 《计算机科学》 CSCD 北大核心 2003年第10期160-162,166,共4页 Computer Science
基金 国家自然科学基金 (No.90104031)
关键词 计算机网络 入侵检测系统 自动入侵响应系统 网络安全 Automated intrusion response, Cost-sensitive model, Plan recognition, Self-adaptation, Cooperation
  • 相关文献

参考文献11

  • 1Carver C A. Limiting Uncertainty in Intrusion Response. IEEE,2000.
  • 2Carver C A. A Methodology for Using Intelligent Agents to provide Automated Intrusion Response. In: Proe. of the IEEE Systems, 2000.
  • 3Schnackenberg D, Djahandari K, Sterne D. Infrastructure for Intrusion Detection and Response. In: Proc. of the DARPA Information Survivability Conference and Exposition, 2000.
  • 4Center C C. CERT/CC Statistics for 1988. http ://www. cert. org/stats/cert-stats, html, 2000.
  • 5Center C C. CERT Coordination Center 1998. hrtp://www. cert.org/annual-rpts/cert_rpt_ 98. html, 2000.
  • 6Cohen F B. Simulating Cyber Attacks, Defenses, and Consequences. http://all. net/journal/ntb/simulate/simulate.html, 1999.
  • 7Carver C A. Intrusion Response Systems: A Survey. http://facuhy. cs. tamu.edu/pooch/course/CPSC665/Spring2001/Lessons/Intrusion-Detection-and-Response , 2000.
  • 8Lee W. Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security, 2002,10(1-2).
  • 9Lindqvist U,Jonsson E. How to Systematically Classify Computer Security Intrusions. IEEE Symposium on Security and Privacy,1997.
  • 10Geib C W,Goldman R P. Plan Recognition in Intrusion Detection Systems. IEEE, 2001.

同被引文献74

引证文献11

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部