丁德路,姜云飞.智能规划及其应用研究 [A].2001年中国智能自动化会议论文集(下册) [C].北京:中国自动化学会,2001.837-844 Ding Delu,Jiang Yunfei.Intelligent planning and its application [A].CIAC''2001 [C].Beijing:Chinese Association of Automation,2001.837-844.(in Chinese)
[3]
Jakobson G,Weissman M,Brenner L,et al.GRACE:Building next generation event correlation services [A].Network Operations and Management Symposium [C].Washington DC:IEEE Computer Society,2000.701-714.
[4]
NING P,XU D.Learning attack strategies from intrusion alerts [A].Proceedings of the 10th ACM Conference on Computer and Communications Security [C].New York:ACM,2003.200-209.
[5]
Qin X,LEE W.Discovering novel attack strategies form INFOSEC alerts [A].Proceddings of 9th European Symposium on Research in Computer Security [C].US:Springer,2004.439-456.
赖海光,黄皓,谢俊元.基于系统状态集合的攻击模型及其应用[J].计算机应用,2005,25(7):1535-1539. Lai Haiguang,Huang Hao,Xie Junyuan.Attack model and its application based on system states aggregation[J].Computer Applications,2005,25(7):1535-1539.(in Chinese)
[8]
田志宏,张伟哲,张永铮,等.基于权能转换模型的攻击场景推理、假设与预测[J].通信学报,2007,28(12):78-84. Tian Zhihong,Zhang Weizhe,Zhang Yongzheng,et al.Attack scenarios reasoning,hypothesizing and predicting based on capability transition model[J].Journal of Communications,2007,28(12):78-84.(in Chinese)
[9]
郭山清,曾英佩,谢立.基于可信报警事件的在线攻击场景重构算法[J].计算机科学,2006,33(8):100-105. Guo Shanqing,Zeng Yingpei,Xie Li.An online attack scenarios construction algorithms based on delievable alarms[J].Computer Science,2006,33(8):100-105.(in Chinese)
[10]
Peng Ning,Yun Cui,Douglas S Reeves.Constructing attack scenarios through correlation of intrusion alerts [A].Proceedings of the 9th ACM Conference on Computer and Communications Security [C].New York:ACM,2002.245-254.
[11]
Baize Eric.Developing secure products in the age of advanced persistent threats[J].IEEE Security & Privacy,2012,10(3):88-92.
[12]
Jakobson G,Lemmon A,Weissman M.Knowledge-based Gui for network surveillance and fault analysis [A].Network Operations and Management Symposium [C].Washington DC:IEEE Computer Society,1994.846-855.
[13]
梅海彬,龚俭,张明华.基于警报序列聚类的多步攻击模式发现研究[J].通信学报,2011,32(5):63-69. Mei Haibin,Gong Jian,Zhang Minghua.Research on discovering multi-step attack patterns based on clustering IDS alert sequences[J].Journal on Communications,2011,32(5):63-69.(in Chinese)
[14]
何金山.基于智能规划的多步攻击识别方法的研究 [D].长春:吉林大学计算机科学与技术学院,2012. He Jinshan.Research on Multi-Stage Attack Recognition Method Based on AI Planning [D].Changchun:Computer Science and Technology College of Jilin University,2012.(in Chinese)
[15]
王英梅,程湘云,刘增良.基于有限状态机的多阶段网络攻击方法研究[J].空军工程大学学报(自然科学版),2006,7(1):31-34 Wang Yingmei,Cheng Xiangyun,Liu Zengliang.The research for multi-stage attacks based on FSM[J].Journal of Air Force Engineering University(Natural Science Edition),2006,7(1):31-34.(in Chinese)
[16]
王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. Wang Yongjie,Xian Ming,Liu Jin,Wang Guoyu.Study of network security evaluation based on attack graph model[J].Journal on Communications,2007,28(3):29-34.(in Chinese)
[17]
Zhang ZH,Ho PH.Janus:A dual-purpose analytical model for understanding,characterizing and counterming multi-stage collusive attacks in enterprise networks.Journal of network and computer applications,2009,32(3):710-720.
[18]
黄光球,任大勇.基于双枝模糊决策与模糊Petri网的攻击模型[J].计算机应用,2007,27(11):2689-2693. Huang Guangqiu,Ren Dayong.Attack model based on both-branch fuzzy decision-making and fuzzy petri net[J].Journal of Computer Applications,2007,27(11):2689-2693.(in Chinese)
[19]
孙雷,姜淑娟,曾英佩,郭山清.基于系统漏洞的多步攻击场景构建[J].计算机工程,2007,33(20):150-152. Sun Lei,Jiang Shujuan,Zeng Yingpei,Guo Shanqing.Attack scenarios construction based on system vulnerabilities[J].Computer Engineering,2007,33(20):150-152.(in Chinese)
[20]
Ahmadinejad SH,Jalili S,Abadi M.A Hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs[J].Computer networks,2011,55(9):2221-2240.
[21]
Liu Zhijie,Wang Chongjun,Chen Shifu.Correlating multi-step attack and constructing attack scenarios based on pattern modeling [A].Proceedings of the second international conference on information security and assurance [C].Washington DC:IEEE Computer Society,2008.214-219.
[22]
Peng Ning,Yun Cui,Douglas S Reeves,DingBang Xu.Techniques and tools for analyzing intrusion alerts[J].ACM Transactions on Information and System Security,2004,7(2):274-318.