作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (9): 151-153. doi: 10.3969/j.issn.1000-3428.2008.09.054

• 安全技术 • 上一篇    下一篇

入侵事件建模研究

高秀峰1,陈立云1,胡昌振2   

  1. (1. 军械工程学院计算机工程系,石家庄 050003;2. 北京理工大学,北京 100081)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-05-05 发布日期:2008-05-05

Study of Intrusion Events Modeling

GAO Xiu-feng1, CHEN Li-yun1, HU Chang-zhen2   

  1. (1. Department of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003; 2. Beijing Institute of Technology, Beijing 100081)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-05-05 Published:2008-05-05

摘要: 入侵过程由一系列入侵行为组成,每个入侵行为包含一个或多个入侵事件,这些事件间可能存在各种各样的关系。该文对入侵事件特征进行研究,从检测角度对入侵事件进行分类。定义了入侵事件,建立了入侵事件的一般模型。从时间、空间和功能方面分析了事件间的内在联系,并依据这些关系建立了入侵事件逻辑、统计和模糊模型,以描述不同的入侵行为,并举实例予以分析。

关键词: 入侵事件, 事件关系, 事件模型

Abstract: Intrusion process consists of a series of intrusion behavior, which comprises one or some intrusion events. There are various relations among these intrusion events. Intrusion characteristic is studied, and intrusion events are classified by those aspects of intrusion. By defining intrusion event, common model of intrusion events is established. Based on analysis of time relations, space relations and function relations among intrusion events, the logical model, statistical model and fuzzy model are established. With these models, intrusion behavior can be represented. And it is testified by instance.

Key words: intrusion events, event relation, event model

中图分类号: