{"title":"基于关联攻击图的入侵预测算法研究","authors":"Xiao-ling He","doi":"10.1109/ICCSN.2019.8905351","DOIUrl":null,"url":null,"abstract":"In view of the problem that the attack diagram model can't accurately reflect the impact of attack evidence on the intrusion intent prediction, an intrusion prediction algorithm, INPA based on association attack diagram, ASAD is proposed. This paper defines the parameters of resource node D, attack evidence M, single-step attack T, etc., and constructs the associated attack diagram model to describe the whole process of the intruder reaching the target node from the initial node, and then, Bayesian inference design and Associated quantization algorithm, Correlate are used to calculate the probability of single-step attack. Finally, combined with the And-Or relationship between the directed edges of ASAD, the expression formula of the reach probability of each node is derived, and INPA is designed to realize the function of dynamic prediction the potential intrusion in the network.","PeriodicalId":330766,"journal":{"name":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Research on Intrusion Prediction Algorithm Based on Association Attack Diagram ASAD\",\"authors\":\"Xiao-ling He\",\"doi\":\"10.1109/ICCSN.2019.8905351\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In view of the problem that the attack diagram model can't accurately reflect the impact of attack evidence on the intrusion intent prediction, an intrusion prediction algorithm, INPA based on association attack diagram, ASAD is proposed. This paper defines the parameters of resource node D, attack evidence M, single-step attack T, etc., and constructs the associated attack diagram model to describe the whole process of the intruder reaching the target node from the initial node, and then, Bayesian inference design and Associated quantization algorithm, Correlate are used to calculate the probability of single-step attack. Finally, combined with the And-Or relationship between the directed edges of ASAD, the expression formula of the reach probability of each node is derived, and INPA is designed to realize the function of dynamic prediction the potential intrusion in the network.\",\"PeriodicalId\":330766,\"journal\":{\"name\":\"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSN.2019.8905351\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSN.2019.8905351","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Intrusion Prediction Algorithm Based on Association Attack Diagram ASAD
In view of the problem that the attack diagram model can't accurately reflect the impact of attack evidence on the intrusion intent prediction, an intrusion prediction algorithm, INPA based on association attack diagram, ASAD is proposed. This paper defines the parameters of resource node D, attack evidence M, single-step attack T, etc., and constructs the associated attack diagram model to describe the whole process of the intruder reaching the target node from the initial node, and then, Bayesian inference design and Associated quantization algorithm, Correlate are used to calculate the probability of single-step attack. Finally, combined with the And-Or relationship between the directed edges of ASAD, the expression formula of the reach probability of each node is derived, and INPA is designed to realize the function of dynamic prediction the potential intrusion in the network.