DocumentCode :
1820529
Title :
Research on Attack Intention Recognition Based on Graphical Model
Author :
Peng Wu ; Wang Zhigang ; Chen Junhua
Author_Institution :
Lab. for Comput. Network Defense Technol., Beijing Inst. of Technol., Beijing, China
Volume :
1
fYear :
2009
fDate :
18-20 Aug. 2009
Firstpage :
360
Lastpage :
363
Abstract :
Intention recognition is the ability to predict an opposing forcepsilas high level goals. Knowing an attackerpsilas intention can support the decision-making of the network security administrators. Furthermore intent analysis plays an import role in the calculation of the inherent threat value. So how to recognize attack intention has become a research hot in network security domain recently.In this paper taxonomy of attack intention characterized by consequences of attack and targets of attack is introduced at first. Then a graphical model based on network security state is presented and used to recognize attack intention. D-S evidence theory is also introduced to deal with the uncertainty in the process of intent inference. Next algorithms of intention recognition and threat assessment are given in detail in order to offer a way to assess the network security situation. Finally several experiments are done in a local network. The results of the experiments prove the feasibility and validity of this method.
Keywords :
case-based reasoning; decision making; graph theory; network theory (graphs); security of data; telecommunication security; uncertainty handling; Dempster-Shafer evidence theory; attack intention recognition algorithms; decision-making support; graphical model; intent analysis; intent inference; network security administration; network security state graph; threat value assessment algorithm; uncertainty handling; Artificial intelligence; Collaborative software; Computer security; Data security; Decision making; Graphical models; Information security; Intrusion detection; Taxonomy; Uncertainty; graphical model; intention recognition; network security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security, 2009. IAS '09. Fifth International Conference on
Conference_Location :
Xian
Print_ISBN :
978-0-7695-3744-3
Type :
conf
DOI :
10.1109/IAS.2009.158
Filename :
5284049
Link To Document :
بازگشت