원문정보
초록
영어
The determination of network equipment weaknesses and the discovery of intrusion intention is one of the difficulties that troubled network security management personnel. Based on previous studies, further proposed a double attack graph based on domain-equipment. By the underlying network topology data collected and analyzed, using Bayesian theory to complete the quantify for the double attack graph and generation strategy in minimal power key set, with the cost of calculation of key equipment in the automatic recognition network topology, we provide an important basis for network maintenance. Experimental results show that the measure of using quantitative domain-equipment double attack graph to recognize the intrusion intention is not only effective and feasible, but also has the feature of easy promotion.
목차
1. Introduction
2. Building Automatic Recognition Model for Intrusion Intention
2.1. Intrusion Intention and Recognition Model
2.2. Domain-equipment Two-tier Attack Graph
2.3. Attack Graph Generation Strategy
3. Quantitative Analysis of Intrusion Intention and Response Strategies
3.1. Quantitative Analysis of Intrusion Intention
3.2 Minimal Right Key Set of Attack Graph
3.3 Intrusion Intention Response based on the Minimal Right Key Set
4. Test and Analysis of the Experiment
5. Conclusion
Acknowledgement
References