DocumentCode
1820529
Title
Research on Attack Intention Recognition Based on Graphical Model
Author
Peng Wu ; Wang Zhigang ; Chen Junhua
Author_Institution
Lab. for Comput. Network Defense Technol., Beijing Inst. of Technol., Beijing, China
Volume
1
fYear
2009
fDate
18-20 Aug. 2009
Firstpage
360
Lastpage
363
Abstract
Intention recognition is the ability to predict an opposing forcepsilas high level goals. Knowing an attackerpsilas intention can support the decision-making of the network security administrators. Furthermore intent analysis plays an import role in the calculation of the inherent threat value. So how to recognize attack intention has become a research hot in network security domain recently.In this paper taxonomy of attack intention characterized by consequences of attack and targets of attack is introduced at first. Then a graphical model based on network security state is presented and used to recognize attack intention. D-S evidence theory is also introduced to deal with the uncertainty in the process of intent inference. Next algorithms of intention recognition and threat assessment are given in detail in order to offer a way to assess the network security situation. Finally several experiments are done in a local network. The results of the experiments prove the feasibility and validity of this method.
Keywords
case-based reasoning; decision making; graph theory; network theory (graphs); security of data; telecommunication security; uncertainty handling; Dempster-Shafer evidence theory; attack intention recognition algorithms; decision-making support; graphical model; intent analysis; intent inference; network security administration; network security state graph; threat value assessment algorithm; uncertainty handling; Artificial intelligence; Collaborative software; Computer security; Data security; Decision making; Graphical models; Information security; Intrusion detection; Taxonomy; Uncertainty; graphical model; intention recognition; network security;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Assurance and Security, 2009. IAS '09. Fifth International Conference on
Conference_Location
Xian
Print_ISBN
978-0-7695-3744-3
Type
conf
DOI
10.1109/IAS.2009.158
Filename
5284049
Link To Document