留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于成本分析的入侵检测响应模型

董红 邱菀华 吕俊杰

董红, 邱菀华, 吕俊杰等 . 基于成本分析的入侵检测响应模型[J]. 北京航空航天大学学报, 2008, 34(01): 39-42.
引用本文: 董红, 邱菀华, 吕俊杰等 . 基于成本分析的入侵检测响应模型[J]. 北京航空航天大学学报, 2008, 34(01): 39-42.
Dong Hong, Qiu Wanhua, Lü Junjieet al. Intrusion detection response model based on cost-analysis[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(01): 39-42. (in Chinese)
Citation: Dong Hong, Qiu Wanhua, Lü Junjieet al. Intrusion detection response model based on cost-analysis[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(01): 39-42. (in Chinese)

基于成本分析的入侵检测响应模型

基金项目: 国家自然科学基金资助项目(70372011); 高校博士点专项科研基金资助项目(20030006009)
详细信息
  • 中图分类号: TP 309

Intrusion detection response model based on cost-analysis

  • 摘要: 运用博弈论及信息安全技术有关理论,提出了一个基于成本分析的入侵响应投资模型,得出在此安全技术配置下博弈双方的最优策略,讨论了入侵响应的纳什均衡解,并通过成本分析从理论和实践两方面验证了此模型的合理性.针对现有入侵响应系统中不计成本就进行响应的问题,引入入侵损失和响应成本,通过比较二者关系,分析了系统管理员进行响应的条件成本,从而给出系统管理员灵活调整入侵响应的自适应策略,提高信息系统的安全性及抵抗攻击的能力,且避免不必要的资源浪费,实现信息保护和资源可用之间的平衡.

     

  • [1] Rebecca T Mercuri. Security watch: analyzing security costs[J]. Communications of the ACM,2003,46(6):15-18 [2] Bistarelli S, Fioravanti F, Peretti P. Defense trees for economic evaluation of security investments Proceedings of the First International Conference on Availability, Reliability and Security (ARES-06) IEEE.Los Alamitos: The IEEE Computer Society, 2006:416-423 [3] Cremonini M, Martini P. Evaluating information security investments from attackers perspective: the Return-On-Attack (ROA) Proceedings of the Fourth Workshop on the Economics of Information Security. Cambridge: ,2005 [4] Gordon L,Loeb M. The economics of information security investment[J]. ACM Transactions on Information and System Security,2002,5(4):438-457 [5] Gordon L,Loeb M.Budgeting process for information security expenditures[J]. Communications of the ACM,2006,49(1):121-125 [6] Cavusoglu H, Mishra B, Raghunathan S. A model for evaluating IT security investments[J].Communications of the ACM,2004,47(7):87-92 [7] Cavusoglu H, Mishra B, Raghunathan S.The value of IDS in IT security architecture[J].Information Systems Research,2005,19(1):28-46 [8] Wenke Lee, Wei Fan, Matthew Miller,et al. Toward cost-sensitive modeling for intrusion detection and response[J].Journal of Computer Security,2002,10:5-22 [9] McHugh J, Christie A.C, Allen J. Defending yourself: The role of intrusion detection systems[J]. IEEE Software,2000,17(5):42-51 [10] NIST Publication 800-12.1996. An Introduction to Computer Security[S] [11] NorthcuttS.Intrusion detection:an analyst-handbook[M].Indianapolis: New Riders Publishing ,1999
  • 加载中
计量
  • 文章访问数:  3534
  • HTML全文浏览量:  192
  • PDF下载量:  1106
  • 被引次数: 0
出版历程
  • 收稿日期:  2007-01-22
  • 网络出版日期:  2008-01-31

目录

    /

    返回文章
    返回
    常见问答