[1] |
PETER M M , TIMOTHY G . SP 800-145.The NIST definition of cloud computing[M]. National Institute of Standards & Technology, 2011.
|
[2] |
PENG N , YUN C , REEVES D S ,et al. Constructing attack scenarios through correlation of intrusion alerts[C]// ACM Symposium on Computer and Communications Security. New York:ACM Press, 2002: 245-254.
|
[3] |
WANG L , GHORBANI A , LI Y ,et al. Automatic multi-step attack pattern discovering[J]. International Journal of Network Security, 2010,10(2): 142-152.
|
[4] |
梅海彬, 龚俭, 张明华 ,等. 基于警报序列聚类的多步攻击模式发现研究[J]. 通信学报, 2011,32(5): 63-69.
|
|
MEI H B , GONG J , ZHANG M H ,et al. Research on discovering multi-step attack patterns based on clustering IDS alert sequences[J]. Journal on Communications, 2011,32(5): 63-69.
|
[5] |
葛琳, 季新生, 江涛 ,等. 基于关联规则的网络信息内容安全事件发现及其 Map-Reduce 实现[J]. 电子与信息学报, 2014,36(8): 1831-1837.
|
|
GE L , JI X S , JIANG T ,et al. Association rules and its implementation in Map-Reduce[J]. Journal of Electronics & Information Technology, 2014,36(8): 1831-1837.
|
[6] |
鲁显光, 杜学绘, 王文娟 ,等. 基于改进FP growth的告警关联算法[J]. 计算机科学, 2019,46(8): 64-70.
|
|
LU X G , DU X H , WANG W J ,et al. Alert correlation algorithm based on improved FP growth[J]. Computer Science, 2019,46(8): 64-70.
|
[7] |
WANG S , TANG G , KOU G ,et al. An attack graph generation method based on heuristic searching strategy[C]// IEEE International Conference on Computer and Communications. Piscataway:IEEE Press, 2016: 1180-1185.
|
[8] |
KAYNAR K , SIVRIKAYA F . Distributed attack graph generation[J]. IEEE Transactions on Dependable and Secure Computing, 2016,13(5): 519-532.
|
[9] |
吕慧颖, 彭武, 王瑞梅 ,等. 基于时空关联分析的网络实时威胁识别与评估[J]. 计算机研究与发展, 2014,51(5): 1039-1049.
|
|
LYU H Y , PENG W , WANG R M ,et al. A real-time network threat recognition and assessment method based on association analysis of time and space[J]. Journal of Computer Research and Development, 2014,51(5): 1039-1049.
|
[10] |
刘威歆, 郑康锋, 武斌 ,等. 基于攻击图的多源告警关联分析方法[J]. 通信学报, 2015,36(9): 135-144.
|
|
LIU W X , ZENG K F , WU B ,et al. Alert processing based on attack graph and multi-source analyzing[J]. Journal on Communications, 2015,36(9): 135-144.
|
[11] |
陈小军, 方滨兴, 谭庆丰 ,等. 基于概率攻击图的内部攻击意图推断算法研究[J]. 计算机学报, 2014,37(1): 62-72.
|
|
CHEN X J , FANG B X , TAN Q F ,et al. Inferring attack intent of malicious insider based on probabilistic attack graph[J]. Journal of Computers, 2014,37(1): 62-72.
|
[12] |
王硕, 汤光明, 王建华 ,等. 基于因果知识网络的攻击场景构建方法[J]. 计算机研究与发展, 2018,55(12): 2620-2636.
|
|
WANG S , TANG G M , WANG J H ,et al. Attack scenario construction method based on causal knowledge net[J]. Journal of Computer Research and Development, 2018,55(12): 2620-2636.
|
[13] |
许嘉, 张千桢, 赵翔 ,等. 动态图模式匹配技术综述[J]. 软件学报, 2018,29(3): 663-688.
|
|
XU J , ZHANG Q Z , ZHAO X ,et al. Survey on dynamic graph pattern matching technologies[J]. Journal of Software, 2018,29(3): 663-688.
|
[14] |
OU X , GOVINDAVAJHALA S , APPEL A W ,et al. MulVAL:a logic-based network security analyzer[C]// 14th USENIX Security. Berkeley:USENIX Association, 2005: 1-16.
|
[15] |
JAJODIA S , NOEL S . Topological vulnerability analysis:a powerful new approach for network attack prevention,detection,and response[J]. Algorithms,Architectures and Information Systems Security, 2005: 285-305.
|
[16] |
LIPPMANN R , INGOLS K , SCOTT C ,et al. Validating and restoring defense in depth using attack graphs[C]// Milcom 2006 Military Communications Conference.[S.n.:s.l.], 2006: 1-10.
|
[17] |
SCARFONE K , MELL P . An analysis of CVSS version 2 vulnerability scoring[C]// International Symposium on Empirical Software Engineering & Measurement. Piscataway:IEEE Press, 2009.
|
[18] |
冯学伟, 王东霞, 黄敏桓 ,等. 一种基于马尔可夫性质的因果知识挖掘方法[J]. 计算机研究与发展, 2014,51(11): 2493-2504.
|
|
FENG X W , WANG D X , HUANG M H ,et al. A mining approach for causal knowledge in alert correlating based on the Markov property[J]. Journal of Computer Research and Development, 2014,51(11): 2493-2504.
|