Research of D-S Evidence Method in Network Attack Intention Recognition

被引:0
作者
Zhang, Yajing [1 ]
Yu, Lina [1 ]
Li, Wei [2 ]
机构
[1] Hebei Coll Ind & Technol, Dept Comp Technol, Shijiazhuang, Peoples R China
[2] Caida Secur CO LTD, Dept Comp, Shijiazhuang, Peoples R China
来源
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC & MECHANICAL ENGINEERING AND INFORMATION TECHNOLOGY (EMEIT-2012) | 2012年 / 23卷
关键词
D-S evidence method; network attack; intention recognition;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When the network security threats alarm as evidence appeared, from these alarm properties were then able to predict the future attack important information, such as attack source, is the object of attack and attack port, etc. But the information is not enough to reflect the invaders attack intention. This paper puts forward a kind of attack intention recognition called D-S evidence theory method.
引用
收藏
页数:4
相关论文
共 10 条
  • [1] Ammann P., 2002, P 9 ACM C COMP COMM
  • [2] [Anonymous], 2001, INT WORKSH REC ADV I
  • [3] ARDA, 2005, ADV RES DEV ACT EXPL
  • [4] Bass T, 2000, COMMUN ACM, V43, P90
  • [5] Goodall J. R, 2004, P 10 AM C INF SYST
  • [6] Mining alarm clusters to improve alarm handling efficiency
    Julisch, K
    [J]. 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 12 - 21
  • [7] Li Yanmei, 2011, ADV INFORM SCI SERVI, V3, p[375, 11]
  • [8] Ning P., 2004, ACM Transactions on Information and Systems Security, V7, P274, DOI 10.1145/996943.996947
  • [9] Porras PA, 2002, LECT NOTES COMPUT SC, V2516, P95
  • [10] Revisions to the JDL data fusion model
    Steinberg, AN
    Bowman, CL
    White, FE
    [J]. SENSOR FUSION: ARCHITECTURES, ALGORITHMS, AND APPLICATIONS III, 1999, 3719 : 430 - 441