[1] |
SHAH C . Zeus crime ware toolkit[EB/OL]. .
|
[2] |
QIN X , LEE W . Statistical causality of INFOSEC alert data[C]// Recent Advances in Intrusion Detection 2003. Berlin, 2003: 73-93.
|
[3] |
梅海彬, 龚俭, 张明华 . 基于警报序列聚类的多步攻击模式发现研究[J]. 通信学报, 2011,32(5): 63-69. MEI H B , GONG J , ZHANG M H . Research on discovering multi-step attack patterns based on clustering IDS alert sequences[J]. Journal on Communications, 2011,32(5): 63-69.
|
[4] |
VALEUR F , VIGNA G , KRUEGEL C ,et al. A comprehensive approach to intrusion detection alert correlation[J]. IEEE Trans.Dependable and Secure Computing, 2004,1(3): 146-169.
|
[5] |
JAJODIA S , NOEL S , KALAPA P ,et al. Cauldron:mission-centric cyber situational awareness with defense in depth[C]// The Military Communications Conference. Baltimore, 2011: 1339-1344.
|
[6] |
YU D , FRINCKE D . Improving the quality of alerts and predicting intruder’s next goal with hidden colored petri-net[J]. Computer Networks, 2007,51(3): 632-654.
|
[7] |
WANG L , ISLAM T , LONG T ,et al. An attack graph-based probabilistic security metric[C]// Data and Applications Security XXII. Berlin Heidelberg, 2008: 283-296.
|
[8] |
苏婷婷, 潘晓中, 肖海燕 . 基于属性邻接矩阵的攻击图表示方法研究[J]. 电子与信息学报, 2012,34(7): 1744-1747. SU T T , PAN X Z , XIAO H Y . Research on attack graph based on attributes adjacncy matrix[J]. Journal of Electronics & Information Technology, 2012,34(7): 1744-1747.
|
[9] |
陈小军, 方滨兴, 谭庆丰 . 基于概率攻击图的内部攻击意图推断算法研究[J]. 计算机学报, 2014,37(1): 62-72. CHEN X J , FANG B X , TAN Q F . Inferring attack intent of malicious insider based on probabilistic attack graph model[J]. Chinese Journal of Computers, 2014,37(1): 62-72.
|
[10] |
吕慧颖, 彭武, 王瑞梅 . 基于时空关联分析的网络实时威胁识别与评估[J]. 计算机研究与发展, 2014,51(5): 1039-1049. LV H Y , PENG W , WANG R M . A real-time network threat recognition and assessment method based on association analysis of time and space[J]. Journal of Computer Research and Development, 2014,51(5): 1039-1049.
|
[11] |
XIE P , LI J H , OU X M ,et al. Using Bayesian networks for cyber security analysis[C]// The 40th IEEE/IFIP International Conference on Dependable Systems and Networks(DSN). Chicago, 2010: 211-220.
|
[12] |
张少俊, 李建华, 宋珊珊 . 贝叶斯推理在攻击图节点置信度计算中的应用[J]. 软件学报, 2010,21(9): 2376-2386. ZHANG S J , LI J H , SONG S S . Using Bayesian inference for computing attack graph node beliefs[J]. Journal of Software, 2010,21(9): 2376-2386.
|
[13] |
ABRAHAM S , NAIR S . A predictive framework for cyber security analytics using attack graphs[J]. International Journal of Computer Networks & Communications, 2015,7(1): 1-17.
|
[14] |
FREDJ O B . A realistic graph-based alert correlation system[J]. Security and Communication Network, 2015,8(15): 2477-2493.
|
[15] |
冯学伟, 王东霞, 黄敏桓 . 一种基于马尔可夫性质的因果知识挖掘方法[J]. 计算机研究与发展, 2014,51(11): 2493-2504. FENG X W , WANG D X , HANG M H . A mining approach for causal knowledge in alert correlating based on the Markov property[J]. Journal of Computer Research and Development, 2014,51(11): 2493-2504.
|