版权说明 操作指南
首页 > 成果 > 详情

Using Cluster and Correlation to Construct Attack Scenarios

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文
作者:
Zhang, Yugang*;Mao, Shisong;Zhuang, Xin;Peng, Xi
通讯作者:
Zhang, Yugang
作者机构:
[Zhuang, Xin; Mao, Shisong; Zhang, Yugang; Peng, Xi] Huazhong Normal Univ, Dept Comp Sci, Wuhan 430079, Peoples R China.
通讯机构:
[Zhang, Yugang] H
Huazhong Normal Univ, Dept Comp Sci, Wuhan 430079, Peoples R China.
语种:
英文
期刊:
PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS
年:
2008
页码:
471-476
机构署名:
本校为第一且通讯机构
院系归属:
计算机学院
摘要:
Nowadays, it becomes more and more important to construct high-level attack scenarios from low-level intrusion alerts reported by intrusion detection systems (IDSs). Some methods have been presented to resolve this problem. These methods have different strengths. However, they also have different limitations. In order to build complicated attack processes accurately, this paper uses cluster and correlation techniques to construct high-level attack scenarios. Fuzzy cluster algorithm based on the similarity of attack attributes is proposed to classify alerts generated by IDSs. And then in every ...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com