Intrusion intention recognition and response based on weighed plan knowledge graph

被引:0
|
作者
Cai, Zengyu [1 ]
Zhang, Qikun [1 ]
Zhang, Ran [1 ]
Gan, Yong [1 ]
机构
[1] Cai, Zengyu
[2] Zhang, Qikun
[3] Zhang, Ran
[4] Gan, Yong
来源
Cai, Zengyu | 1600年 / Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia卷 / 18期
关键词
Knowledge graph - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
With the development of the network, security has become the focus problem of network. To be effective, current intrusion prevention systems must incorporate artificial intelligence methods, such as plan recognition and adversarial plan. Plan recognition is critical for predicting the future actions of attackers and the adversarial plan is critical for planning appropriate responses to attacks. In this paper, an attack intention and plan recognition method based on weighted planning knowledge graph is presented to predict the anomaly intentions of potential intruders to a computer system according to the observation data. And the adversarial planning method based on HTN planning to response the future actions of attackers is also presented. The experimental results show that the plan recognition method based on weighed planning knowledge graph has a good accuracy in predicting the intrusion intentions. The experimental results also show that the adversarial planning method can prevent computer system correctly and effectively.
引用
收藏
页码:151 / 157
相关论文
共 50 条
  • [1] Plan recognition algorithm based on plan knowledge graph
    Jiang, Yun-Fei
    Ma, Ning
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (04): : 686 - 692
  • [2] Research of Automatic Recognition Double Layers Intrusion Intention Algorithm Based on Attack Graph
    Wang Guangze
    Wang Peng
    Luo Zhiyong
    Zhu Suxia
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 183 - 191
  • [3] A new bottom-up plan recognition algorithm based on plan knowledge graph
    Yan, Shu-ya
    Gu, Wen-Xiang
    Yang, Yong-juan
    2007 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-7, 2007, : 172 - 175
  • [4] An intrusion intention analysis algorithm based on attack graph
    Zhu Z.
    Chai G.
    International Journal of Circuits, Systems and Signal Processing, 2021, 15 : 643 - 650
  • [5] KGTLIR: An Air Target Intention Recognition Model Based on Knowledge Graph and Deep Learning
    Cao, Bo
    Xing, Qinghua
    Li, Longyue
    Xing, Huaixi
    Song, Zhanfu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (01): : 1251 - 1275
  • [6] Network intrusion intention analysis model based on Bayesian attack graph
    Luo Z.
    Yang X.
    Liu J.
    Xu R.
    1600, Editorial Board of Journal on Communications (41): : 160 - 169
  • [7] Intrusive intention recognition based on attack path graph
    Peng, Wu
    Hu, Chang-Zhen
    Yao, Shu-Ping
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2010, 30 (09): : 1077 - 1081
  • [8] A hostile plan recognition based on plan semantic tree-graph
    Gu, Wen-xiang
    Zhou, Jun-ping
    2007 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-7, 2007, : 521 - 526
  • [9] Plan recognition in intrusion detection systems
    Geib, CW
    Goldman, RP
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 46 - 55
  • [10] Decision on optimal active response based on intrusion graph
    Hu, He
    Hu, Chang-Zhen
    Yao, Shu-Ping
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2012, 38 (11): : 1659 - 1664