###
DOI:
Journal of Software:2008.19(10):2746-2753

一种基于攻击图的入侵响应方法
石进,郭山清,陆音,谢立
(南京大学 计算机科学与技术系,江苏 南京 210093;山东大学 计算机科学与技术学院,山东 济南 250101)
An Intrusion Response Method Based on Attack Graph
SHI Jin,GUO Shan-Qing,LU Yin,XIE Li
()
Abstract
Chart / table
Reference
Similar Articles
Article :Browse 3534   Download 3228
Received:July 30, 2007    Revised:February 25, 2008
> 中文摘要: 针对当前入侵响应工作中存在的不能充分考虑系统的收益,以及不能充分考虑攻击者策略变化因素等问题,提出了一种基于攻击图的入侵响应IRAG(intrusion response based on attack graph)模型.该模型较好地解决了攻击意图及策略变化的问题,并全面考虑了系统、攻击者的收益等因素.实验结果表明,IRAG模型有效地提高了响应的准确性和效果.
Abstract:System incentive and alternation of attacker's strategies are not taken into full consideration in current intrusion response research. An intrusion response model (intrusion response based on attack graph, IRAG) based on the attack graph is proposed to solve this problem. IRAG model deals well with the attack's intent and alternation of strategies, and takes account of incentives of system and attacker across-the-board. The experimental results show that the IRAG model can effectively improve the accuracy and effectiveness of alert response.
文章编号:     中图分类号:    文献标志码:
基金项目:Supported by the National High-Tech Research and Development Plan of China under Grant No.2003AA144010 (国家高技术研究发展计划(863)); the High-Tech Research Plan of Jiangsu Province of China under Grant No.BG2005029 (江苏省高技术研究计划) Supported by the National High-Tech Research and Development Plan of China under Grant No.2003AA144010 (国家高技术研究发展计划(863)); the High-Tech Research Plan of Jiangsu Province of China under Grant No.BG2005029 (江苏省高技术研究计划)
Foundation items:
Reference text:

石 进,郭山清,陆 音,谢 立.一种基于攻击图的入侵响应方法.软件学报,2008,19(10):2746-2753

SHI Jin,GUO Shan-Qing,LU Yin,XIE Li.An Intrusion Response Method Based on Attack Graph.Journal of Software,2008,19(10):2746-2753