Journal of Terahertz Science and Electronic Information Technology , Volume. 21, Issue 11, 1370(2023)

Intelligent mining model of attack events based on Bayesian network

LI Yuefeng and LIU Dan
Author Affiliations
  • [in Chinese]
  • show less
    References(10)

    [1] [1] ZHANG Aifang,LI Zhitang,LI Dong,et al. Discovering novel multistage attack patterns in alert streams[C]// 2007 International Conference on Networking, Architecture, and Storage(NAS 2007). Guilin, Guangxi, China: IEEE, 2007: 115-121. doi: 10.1109/ NAS.2007.20.

    [5] [5] KUMAR R, RUIJTERS E, STOELINGA M. Quantitative attack tree analysis via priced timed automata[C]// International Conference on Formal Modeling and Analysis of Timed Systems. Cham: Springer, 2015: 156-171. doi: 10.1007/978-3-319- 22975-1_11.

    [6] [6] GADYATSKAYA O, JHAWAR R, KORDY P, et al. Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0[C]// International Conference on Quantitative Evaluation of Systems. Cham: Springer, 2016: 159-162. doi: 10.1007/978-3-319-43425-4_10.

    [7] [7] BOPCHE G S,MEHTRE B M. Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks[J]. Computers & Security, 2017(64):16-43. doi:10.1016/j.cose.2016.09.010.

    [10] [10] NOEL S, JAJODIA S. Optimal IDS sensor placement and alert prioritization using attack graphs[J]. Journal of Network and Systems Management, 2008,16(3):259-275. doi:10.1007/s10922-008-9109-x.

    [11] [11] LIU Sichao, LIU Yuan. Network security risk assessment method based on HMM and attack graph model[C]// 2016 the 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing(SNPD). Shanghai,China:IEEE, 2016:517-522. doi:10.1109/SNPD.2016.7515951.

    [13] [13] YI Feng,CAI Huangyi,XIN Fuzheng. A logic-based attack graph for analyzing network security risk against potential attack[C]// 2018 IEEE International Conference on Networking, Architecture and Storage(NAS). Chongqing, China: IEEE, 2018: 1-4. doi: 10.1109/NAS.2018.8515733.

    [15] [15] POOLSAPPASIT N,DEWRI R, RAY I. Dynamic security risk management using Bayesian attack graphs[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(1):61-74. doi:10.1109/TDSC.2011.34.

    [16] [16] HU Zhisheng,ZHU Minghui,LIU Peng. Online algorithms for adaptive cyber defense on Bayesian attack graphs[C]// Proceedings of the 2017 workshop on moving target defense. Dallas, Texas, USA: Association for Computing Machinery, 2017: 99-109. doi: 10.1145/3140549.3140556.

    [17] [17] MATTHEWS I, MACE J, SOUDJANI S, et al. Cyclic Bayesian attack graphs: a systematic computational approach[C]// 2020 IEEE the 19th International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom). Guangzhou,China:IEEE, 2020:129-136. doi:10.1109/TrustCom50675.2020.00030.

    Tools

    Get Citation

    Copy Citation Text

    LI Yuefeng, LIU Dan. Intelligent mining model of attack events based on Bayesian network[J]. Journal of Terahertz Science and Electronic Information Technology , 2023, 21(11): 1370

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Jul. 20, 2021

    Accepted: --

    Published Online: Jan. 17, 2024

    The Author Email:

    DOI:10.11805/tkyda2021291

    Topics