An Intrusion Response Method Based on Attack Graph

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identification Method of Attack Path Based on Immune Intrusion Detection

This thesis takes researches on the immune intrusion detection and IP trace back technology. To find out the network data features of the real-time analyses, the distributed immune intrusion detection system and the packet marking theory are used; to guide the dynamically processing of path signs technology, the immune intrusion detection system is used; what’s more, to dynamically adaptive dif...

متن کامل

Host-Based Intrusion Detection and Attack Graph Selection in VNS

Cloud Computing has several major issues and concerns, such as expectations regulations, performance, trust, and data security issues. DDOS is a multiple hosts attacks made simultaneously in all network. DDoS attacks performed some vulnerable action in early stage such as low-frequency vulnerability scanning, multistep exploitation, and identifying the compromised vulnerable virtual machines as...

متن کامل

Enhancing Graph-based Automated DoS Attack Response

‘GrADAR’ is an intuitive approach to create and maintain a model of a computer network and of the availability of its resources from the observations of deployed monitoring systems [JTM07, JTM08]. The graph-based model is able to express both the effects of DoS attacks and characterise the result of available response measures prior to their application in the real-world network. Thus, the appr...

متن کامل

Intrusion Detection for an On-Going Attack

An intrusion-detection system (IDS) for an on-going attack is described. Prior to an attack, an IDS operates in anticipation of a general threat. During an attack, the IDS can deal less in the general and more in the particularnamely, particulars about attackers and attacked devices. A profile of the attacker is developed, using information he reveals about himself during his attacks. Principle...

متن کامل

Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach

Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Software

سال: 2008

ISSN: 1000-9825

DOI: 10.3724/sp.j.1001.2008.02746