Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2008, Vol. 34 ›› Issue (9): 151-153. doi: 10.3969/j.issn.1000-3428.2008.09.054

• Security Technology • Previous Articles     Next Articles

Study of Intrusion Events Modeling

GAO Xiu-feng1, CHEN Li-yun1, HU Chang-zhen2   

  1. (1. Department of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003; 2. Beijing Institute of Technology, Beijing 100081)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-05-05 Published:2008-05-05

入侵事件建模研究

高秀峰1,陈立云1,胡昌振2   

  1. (1. 军械工程学院计算机工程系,石家庄 050003;2. 北京理工大学,北京 100081)

Abstract: Intrusion process consists of a series of intrusion behavior, which comprises one or some intrusion events. There are various relations among these intrusion events. Intrusion characteristic is studied, and intrusion events are classified by those aspects of intrusion. By defining intrusion event, common model of intrusion events is established. Based on analysis of time relations, space relations and function relations among intrusion events, the logical model, statistical model and fuzzy model are established. With these models, intrusion behavior can be represented. And it is testified by instance.

Key words: intrusion events, event relation, event model

摘要: 入侵过程由一系列入侵行为组成,每个入侵行为包含一个或多个入侵事件,这些事件间可能存在各种各样的关系。该文对入侵事件特征进行研究,从检测角度对入侵事件进行分类。定义了入侵事件,建立了入侵事件的一般模型。从时间、空间和功能方面分析了事件间的内在联系,并依据这些关系建立了入侵事件逻辑、统计和模糊模型,以描述不同的入侵行为,并举实例予以分析。

关键词: 入侵事件, 事件关系, 事件模型

CLC Number: