Network intrusion intention analysis model based on Bayesian attack graph

被引:0
|
作者
Luo, Zhiyong [1 ]
Yang, Xu [1 ]
Liu, Jiahui [1 ]
Xu, Rui [1 ]
机构
[1] School of Computer Science and Technology, Harbin University of Science and Technology, Harbin,150080, China
来源
关键词
D O I
10.11959/j.issn.1000-436x.2020172
中图分类号
学科分类号
摘要
Bayesian networks
引用
收藏
页码:160 / 169
相关论文
共 50 条
  • [1] An intrusion intention analysis algorithm based on attack graph
    Zhu, Zhen
    Chai, Guofei
    [J]. International Journal of Circuits, Systems and Signal Processing, 2021, 15 : 643 - 650
  • [2] A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part
    Wu, Kongpei
    Qu, Huiqin
    Huang, Conggui
    [J]. FUTURE INTERNET, 2023, 15 (04):
  • [3] Attack Intention Analysis Model for Network Forensics
    Rasmi, M.
    Jantan, Aman
    [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 403 - 411
  • [4] Complex Network Security Analysis based on Attack Graph Model
    Liu, Zhiming
    Li, Sheng
    He, Jin
    Xie, Di
    Deng, Zhantao
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
  • [5] Study of SDN intrusion intent identification algorithm based on Bayesian attack graph
    Luo, Zhiyong
    Zhang, Yu
    Wang, Qing
    Song, Weiwei
    [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (04): : 216 - 225
  • [6] Network Forensics Attack-Analysis Model Based on Similarity of Intention
    Rasmi, Mohammad
    Jantan, Aman
    Ahmed, Abdulghani Ali
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATION AND EDUCATION TECHNOLOGY (ICCAET 2011), 2011, : 110 - 113
  • [7] Research of Automatic Recognition Double Layers Intrusion Intention Algorithm Based on Attack Graph
    Wang Guangze
    Wang Peng
    Luo Zhiyong
    Zhu Suxia
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 183 - 191
  • [8] A survivability quantitative analysis model for network system based on attack graph
    Zhang, Le-Jun
    Wang, Wei
    Guo, Lin
    Yang, Wu
    Yang, Yong-Tian
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3211 - 3216
  • [9] Multiobjective network security dynamic assessment method based on Bayesian network attack graph
    Xie, Jialiang
    Zhang, Shanli
    Wang, Honghui
    Chen, Mingzhi
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2024, 17 (01) : 38 - 60
  • [10] Specific attack adjusted Bayesian network for intrusion detection system
    Tuba, Milan
    Bulatovic, Dusan
    Miljkovic, Olga
    Simian, Dana
    [J]. MATHEMATICS AND COMPUTERS IN BIOLOGY AND CHEMISTRY, 2008, : 107 - +