메뉴 건너뛰기




Volumn 4, Issue 12, 2011, Pages 1483-1494

Intrusion diagnosis and prediction with expert system

Author keywords

Attack graph; Attack prediction; Certainty factor; Intrusion diagnosis

Indexed keywords

EXPERT SYSTEMS; FORECASTING; INTRUSION DETECTION; NETWORK SECURITY;

EID: 81855168291     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.293     Document Type: Article
Times cited : (7)

References (40)
  • 1
    • 84900652504 scopus 로고    scopus 로고
    • An attack graph based approach for threat identification of an enterprise network. Cyber-security and Global Information Assurance: Threat Analysis and Response Solutions.
    • Ghosh SK, Bhattacharya S, Malhotra S. An attack graph based approach for threat identification of an enterprise network. Cyber-security and Global Information Assurance: Threat Analysis and Response Solutions 2009; pp. 23-45.
    • (2009) , pp. 23-45
    • Ghosh, S.K.1    Bhattacharya, S.2    Malhotra, S.3
  • 2
    • 84944727025 scopus 로고    scopus 로고
    • Efficient minimum-cost network hardening via exploit dependency graphs. In Proceedings of the 19nd Annual Computer Security Applications Conference.
    • Noel S, Jajodia S, O'Berry B, Jacobs M. Efficient minimum-cost network hardening via exploit dependency graphs. In Proceedings of the 19nd Annual Computer Security Applications Conference, 2003; pp. 86-95.
    • (2003) , pp. 86-95
    • Noel, S.1    Jajodia, S.2    O' Berry, B.3    Jacobs, M.4
  • 5
    • 81855203539 scopus 로고    scopus 로고
    • Automated diagnosis for computer forensics
    • Elsaesser C, Tanner MC. Automated diagnosis for computer forensics, 2001.
    • (2001)
    • Elsaesser, C.1    Tanner, M.C.2
  • 6
    • 81855198569 scopus 로고    scopus 로고
    • Intrusion detection, diagnosis, and recovery with self-securing storage. School of Computer Science Carnegie Mellon University, PA
    • Strunk JD, Goodson GR, Pennington AG, Soules CAN, Ganger GR. Intrusion detection, diagnosis, and recovery with self-securing storage. School of Computer Science Carnegie Mellon University, PA, 2002; 15213.
    • (2002) , pp. 15213
    • Strunk, J.D.1    Goodson, G.R.2    Pennington, A.G.3    Soules, C.A.N.4    Ganger, G.R.5
  • 7
    • 84964528090 scopus 로고    scopus 로고
    • Plan recognition in intrusion detection systems. In DARPA Information Survivability Conference and Exposition.
    • Geib CW, Goldman RP. Plan recognition in intrusion detection systems. In DARPA Information Survivability Conference and Exposition, 2001; pp. 46-55.
    • (2001) , pp. 46-55
    • Geib, C.W.1    Goldman, R.P.2
  • 8
    • 21644485091 scopus 로고    scopus 로고
    • Attack plan recognition and prediction using causal networks. In Proceedings of the 20nd Annual Computer Security Applications Conference.
    • Qin X, Lee W. Attack plan recognition and prediction using causal networks. In Proceedings of the 20nd Annual Computer Security Applications Conference, 2004; pp. 370-379.
    • (2004) , pp. 370-379
    • Qin, X.1    Lee, W.2
  • 9
    • 39049104457 scopus 로고    scopus 로고
    • Practical attack graph generation for network defense. In Proceedings of the 22nd Annual Computer Security Applications Conference.
    • Ingols K, Lippmann R, Piwowarski K. Practical attack graph generation for network defense. In Proceedings of the 22nd Annual Computer Security Applications Conference, 2006; pp. 121-130.
    • (2006) , pp. 121-130
    • Ingols, K.1    Lippmann, R.2    Piwowarski, K.3
  • 11
    • 20444480299 scopus 로고    scopus 로고
    • Managing attack graph complexity through visual hierarchical aggregation. In Proceedings of ACM workshop on Visualization and Data Mining for Computer Security.
    • Noel S, Jajodia S. Managing attack graph complexity through visual hierarchical aggregation. In Proceedings of ACM workshop on Visualization and Data Mining for Computer Security, 2004; pp. 109-118.
    • (2004) , pp. 109-118
    • Noel, S.1    Jajodia, S.2
  • 12
    • 55349101217 scopus 로고    scopus 로고
    • Optimal ids sensor placement and alert prioritization using attack graphs
    • Noel S, Jajodia S. Optimal ids sensor placement and alert prioritization using attack graphs. Journal of Network and Systems Management 2008; 16(3): 259-275.
    • (2008) Journal of Network and Systems Management , vol.16 , Issue.3 , pp. 259-275
    • Noel, S.1    Jajodia, S.2
  • 13
    • 34547239511 scopus 로고    scopus 로고
    • A scalable approach to attack graph generation. In Proceedings of the 13th ACM Conference on Computer and Communications Security.
    • Ou X, Boyer WF, Mc Queen MA. A scalable approach to attack graph generation. In Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006; pp. 336-345.
    • (2006) , pp. 336-345
    • Ou, X.1    Boyer, W.F.2    Mc Queen, M.A.3
  • 14
    • 81855198570 scopus 로고    scopus 로고
    • Scenario graphs and attack graphs. PhD Thesis
    • Sheyner OM. Scenario graphs and attack graphs. PhD Thesis, 2004.
    • (2004)
    • Sheyner, O.M.1
  • 16
    • 70349687064 scopus 로고    scopus 로고
    • Rule-based anomaly detection on ip flows. In Proceedings of the 28th IEEE International Conference on Computer Communications.
    • Duffield N, Haffner P, Krishnamurthy B, Ringberg H. Rule-based anomaly detection on ip flows. In Proceedings of the 28th IEEE International Conference on Computer Communications, 2009; pp. 424-432.
    • (2009) , pp. 424-432
    • Duffield, N.1    Haffner, P.2    Krishnamurthy, B.3    Ringberg, H.4
  • 17
    • 84874354377 scopus 로고    scopus 로고
    • Fast packet classification for snort by native compilation of rules. In Proceedings of the 22nd Conference on Large Installation System Administration Conference.
    • Tongaonkar A, Vasudevan S, Sekar R. Fast packet classification for snort by native compilation of rules. In Proceedings of the 22nd Conference on Large Installation System Administration Conference, 2008; pp. 159-165.
    • (2008) , pp. 159-165
    • Tongaonkar, A.1    Vasudevan, S.2    Sekar, R.3
  • 18
    • 26844469668 scopus 로고    scopus 로고
    • Rule weight specification in fuzzy rule-based classification systems
    • Ishibuchi H, Yamamoto T. Rule weight specification in fuzzy rule-based classification systems. IEEE Transactions on Fuzzy Systems 2005; 13(4): 428-435.
    • (2005) IEEE Transactions on Fuzzy Systems , vol.13 , Issue.4 , pp. 428-435
    • Ishibuchi, H.1    Yamamoto, T.2
  • 19
    • 33846238469 scopus 로고    scopus 로고
    • A weighting function for improving fuzzy classification systems performance
    • Mansoori EG, Zolghadri MJ, Katebi SD. A weighting function for improving fuzzy classification systems performance. Fuzzy Sets and Systems 2007; 158(5): 583-591.
    • (2007) Fuzzy Sets and Systems , vol.158 , Issue.5 , pp. 583-591
    • Mansoori, E.G.1    Zolghadri, M.J.2    Katebi, S.D.3
  • 23
    • 0004158119 scopus 로고    scopus 로고
    • Addison-Wesley Longman Publishing Co., Inc.: Boston, MA, USA
    • Jackson P. Introduction to Expert Systems. Addison-Wesley Longman Publishing Co., Inc.: Boston, MA, USA, 1998.
    • (1998) Introduction to Expert Systems
    • Jackson, P.1
  • 24
    • 84947615593 scopus 로고    scopus 로고
    • CVSS. Common vulnerability scoring system.
    • CVSS. Common vulnerability scoring system.
  • 26
    • 33846269000 scopus 로고    scopus 로고
    • A host-based approach to network attack chaining analysis. In Proceedings of the 21th Annual Computer Security Applications Conference.
    • Ammann P, Pamula J, Ritchey R, Street J. A host-based approach to network attack chaining analysis. In Proceedings of the 21th Annual Computer Security Applications Conference, 2005; pp. 72-84.
    • (2005) , pp. 72-84
    • Ammann, P.1    Pamula, J.2    Ritchey, R.3    Street, J.4
  • 27
    • 60649119575 scopus 로고    scopus 로고
    • Host-centric model checking for network vulnerability analysis. In Proceedings of the 24th Annual Computer Security Applications Conference.
    • Hewett R, Kijsanayothin P. Host-centric model checking for network vulnerability analysis. In Proceedings of the 24th Annual Computer Security Applications Conference, 2008; pp. 225-234.
    • (2008) , pp. 225-234
    • Hewett, R.1    Kijsanayothin, P.2
  • 28
    • 77950797703 scopus 로고    scopus 로고
    • An empirical approach to modeling uncertainty inintrusion analysis. In Proceedings of the 25th Annual Computer Security Applications Conference.
    • Ou X, Rajagopalan SR, Sakthivelmurugan S. An empirical approach to modeling uncertainty inintrusion analysis. In Proceedings of the 25th Annual Computer Security Applications Conference, 2009; pp. 494-503.
    • (2009) , pp. 494-503
    • Ou, X.1    Rajagopalan, S.R.2    Sakthivelmurugan, S.3
  • 29
    • 77950788192 scopus 로고    scopus 로고
    • Evaluating network security with two-layer attack graphs. In Proceedings of the 25th Annual Computer Security Applications Conference.
    • Xie AM, Cai Z, Tang C, Hu J, Chen Z. Evaluating network security with two-layer attack graphs. In Proceedings of the 25th Annual Computer Security Applications Conference, 2009; pp. 127-136.
    • (2009) , pp. 127-136
    • Xie, A.M.1    Cai, Z.2    Tang, C.3    Hu, J.4    Chen, Z.5
  • 30
    • 0038687692 scopus 로고    scopus 로고
    • Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security.
    • Ammann P, Wijesekera D, Kaushik S. Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002; pp. 217-224.
    • (2002) , pp. 217-224
    • Ammann, P.1    Wijesekera, D.2    Kaushik, S.3
  • 31
    • 84988504967 scopus 로고    scopus 로고
    • A graph-based system for network-vulnerability analysis. In Proceedings of the 1998 workshop on New security paradigms.
    • Phillips C, Swiler LP. A graph-based system for network-vulnerability analysis. In Proceedings of the 1998 workshop on New security paradigms, 1998; pp. 71-79.
    • (1998) , pp. 71-79
    • Phillips, C.1    Swiler, L.P.2
  • 32
    • 57049131581 scopus 로고    scopus 로고
    • Identifying critical attack assets in dependency attack graphs. In Proceedings of the 13th European Symposium on Research in Computer Security.
    • Sawilla R, Ou X. Identifying critical attack assets in dependency attack graphs. In Proceedings of the 13th European Symposium on Research in Computer Security, 2008; pp. 18-34.
    • (2008) , pp. 18-34
    • Sawilla, R.1    Ou, X.2
  • 33
    • 85116520518 scopus 로고    scopus 로고
    • Topological vulnerability analysis: a powerful new approach for network attack prevention, detection, and response.
    • Statistical Science and Interdisciplinary Research.
    • Jajodia S, Noel S. Topological vulnerability analysis: a powerful new approach for network attack prevention, detection, and response. Algorithms, Architectures and Information Systems Security, Statistical Science and Interdisciplinary Research - Vol. 3, 2009; 285-305.
    • (2009) Algorithms, Architectures and Information Systems Security , vol.3 , pp. 285-305
    • Jajodia, S.1    Noel, S.2
  • 34
    • 84947618692 scopus 로고    scopus 로고
    • Snort. An open source network intrusion system.
    • Snort. An open source network intrusion system.
  • 35
    • 77949610100 scopus 로고    scopus 로고
    • Belief learning in certainty factor model and its application to text categorization. In Proceedings of the 2003 Joint Conference of the 4th International Conference on Information, Communications and Signal Processing, 2003 and the 4th Pacific Rim Conference on Multimedia.
    • Qu W, Shirai K. Belief learning in certainty factor model and its application to text categorization. In Proceedings of the 2003 Joint Conference of the 4th International Conference on Information, Communications and Signal Processing, 2003 and the 4th Pacific Rim Conference on Multimedia, 2003; volume 2, pp. 1192-1196.
    • (2003) , vol.2 , pp. 1192-1196
    • Qu, W.1    Shirai, K.2
  • 36
    • 81855208244 scopus 로고    scopus 로고
    • DAPRA. Dapra intrusion detection evaluation datasets.
    • DAPRA. Dapra intrusion detection evaluation datasets 2000.
    • (2000)
  • 37
    • 51849167357 scopus 로고    scopus 로고
    • Alert prioritization in intrusion detection systems. In IEEE Network Operations and Management Symposium.
    • Alsubhi K, Al-Shaer E, Boutaba R. Alert prioritization in intrusion detection systems. In IEEE Network Operations and Management Symposium, 2008; pp. 33-40.
    • (2008) , pp. 33-40
    • Alsubhi, K.1    Al-Shaer, E.2    Boutaba, R.3
  • 38
    • 77955041904 scopus 로고    scopus 로고
    • An online adaptive approach to alert correlation. In Proceedings of the 7th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment.
    • Ren H, Stakhanova N, Ghorbani A. An online adaptive approach to alert correlation. In Proceedings of the 7th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2010; pp. 153-172.
    • (2010) , pp. 153-172
    • Ren, H.1    Stakhanova, N.2    Ghorbani, A.3
  • 39
    • 33747198726 scopus 로고    scopus 로고
    • Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
    • Wang L, Liu A, Jajodia S. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications, 2006; 29(15): 2917-2933.
    • (2006) Computer Communications , vol.29 , Issue.15 , pp. 2917-2933
    • Wang, L.1    Liu, A.2    Jajodia, S.3
  • 40
    • 84947614002 scopus 로고    scopus 로고
    • Tcpdump File Replay Utility. Netpoke.
    • Tcpdump File Replay Utility. Netpoke.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.