DocumentCode :
442032
Title :
Modeling the intrusion by using capability of attackers
Author :
Wang, Liang-Min ; Zhang, Jian-Ming ; Ma, Jian-feng
Author_Institution :
Dept. of Comput. Sci., Jiangsu Univ., Zhenjiang, China
Volume :
6
fYear :
2005
fDate :
18-21 Aug. 2005
Firstpage :
3639
Abstract :
Modeling the intrusion is an open problem which is necessary to be solved in intrusion tolerance system. A model of state transition and its constructing algorithm is presented which is described with the capability of attackers. With the attention on the influence upon system, the intrusion is described by the capability of the attacker in this model. And the intrusion model is formalized by the definition of meta-attack. Then an approach to cluster the hyper-alerts into meta-attack using correlation-algorithm is presented. In the end, the method on modeling the intrusion by meta-attack is presented, and the proof of existence and uniqueness of the model constructed by this approach are given.
Keywords :
fault tolerant computing; security of data; alert correlation; intrusion model; intrusion tolerance system; meta-attack; state transition model; Buffer overflow; Clustering algorithms; Computer networks; Computer science; Computer science education; Control systems; Information security; Intrusion detection; Laboratories; Logic; Chronicles; Intrusion model; alert correlation; intrusion tolerance; logic correlation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on
Conference_Location :
Guangzhou, China
Print_ISBN :
0-7803-9091-1
Type :
conf
DOI :
10.1109/ICMLC.2005.1527573
Filename :
1527573
Link To Document :
بازگشت