An intrusion response decision-making model based on hierarchical task network planning

被引:42
作者
Mu, Chengpo [1 ]
Li, Yingjiu [2 ]
机构
[1] Beijing Inst Technol, Key Lab Mech Engn & Control, Beijing 100081, Peoples R China
[2] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
关键词
Automated intrusion response system; Hierarchical task network planning; Intrusion response decision-making; Intrusion detection;
D O I
10.1016/j.eswa.2009.07.079
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An intrusion response decision-making model based on hierarchical task network (HTN) planning is presented in the paper. Compared with other response decision-making models, the response decision-making model consists of not only the response measure decision-making process but also response time decision-making process that is firstly proposed in the paper. The response time decision-making model is able to determine response time for different response HTN subtasks. Owing to the introduction of the response time decision-making, the intrusion response system can apply different response strategies to achieve different response goals set by administrators. The proposed response measure decision-making model can optimize a response plan by balancing the response effectiveness and the response negative impact in both a single response measure and a set of response measures. The response decision-making model is self-adaptive and has the ability of tolerating to false positive IDS alerts. The proposed model has been used in the intrusion detection alert management and intrusion response system (IDAM&IRS) developed by us. The functions and architecture of IDAM&IRS are introduced in this paper. In addition, the intrusion response experiments of IDAM&IRS are presented, and the features of the response decision-making model are summarized. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2465 / 2472
页数:8
相关论文
共 15 条
[1]  
CALLAN R, 2003, ARTIF INTELL, P142
[2]  
CARVER CA, 2001, THESIS TEXAS A M U
[3]  
FRED C, 1999, SIMULATING CYBER ATT
[4]  
Lee W., 2002, J COMPUT SECUR, V10, P5
[5]   Survey of intrusion-detection alert aggregation and correlation techniques [J].
School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China .
Jisuanji Yanjiu yu Fazhan, 2006, 1 (1-8) :1-8
[6]  
MU CP, 2005, LNAI, V3801
[7]  
MU CP, 2008, LNCS
[8]  
MU CP, 2005, 10 INT C FUZZ THEOR
[9]  
MU CP, 2006, J DYNAMICS CONTI B S
[10]  
PORTAS PA, 1965, P 20 NAT INF SYST SE, P353