信息保障的证据应计技术

S. Stubberud, K. Kramer
{"title":"信息保障的证据应计技术","authors":"S. Stubberud, K. Kramer","doi":"10.1109/CCST.2016.7815676","DOIUrl":null,"url":null,"abstract":"Information assurance is the process of protecting information from theft, destruction, or manipulation. While many attacks are straightforward such as denial of service or viruses in that they require just a step or two to implement, more dangerous can require numerous steps to implement. Often, these steps need not be done in quick succession or even in a definite order. While techniques have been developed to behave as sensors to quickly assess elements of attacks, they rely on a decision engine to fuse the information to estimate whether or not an attack is underway. To identify such attacks, an evidence accrual system is proposed fuse information and estimate the possibility of an attack. The technique is based on a systems approach to combining information and provides nit only a level of evidence but a degree of uncertainty about the estimate.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"12 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Evidence accrual technique for information assurance\",\"authors\":\"S. Stubberud, K. Kramer\",\"doi\":\"10.1109/CCST.2016.7815676\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information assurance is the process of protecting information from theft, destruction, or manipulation. While many attacks are straightforward such as denial of service or viruses in that they require just a step or two to implement, more dangerous can require numerous steps to implement. Often, these steps need not be done in quick succession or even in a definite order. While techniques have been developed to behave as sensors to quickly assess elements of attacks, they rely on a decision engine to fuse the information to estimate whether or not an attack is underway. To identify such attacks, an evidence accrual system is proposed fuse information and estimate the possibility of an attack. The technique is based on a systems approach to combining information and provides nit only a level of evidence but a degree of uncertainty about the estimate.\",\"PeriodicalId\":6510,\"journal\":{\"name\":\"2016 IEEE International Carnahan Conference on Security Technology (ICCST)\",\"volume\":\"12 1\",\"pages\":\"1-6\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Carnahan Conference on Security Technology (ICCST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2016.7815676\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2016.7815676","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

信息保障是保护信息免遭盗窃、破坏或操纵的过程。许多攻击(如拒绝服务攻击或病毒攻击)都很简单,只需要一两个步骤就可以实现,而更危险的攻击可能需要许多步骤才能实现。通常,这些步骤不需要快速连续地完成,甚至不需要以明确的顺序完成。虽然技术已经发展到像传感器一样快速评估攻击的要素,但它们依赖于决策引擎来融合信息以估计攻击是否正在进行。为了识别这种攻击,提出了一种证据累积系统,融合信息并估计攻击的可能性。该技术基于综合信息的系统方法,不仅提供了一定程度的证据,而且还提供了估计的一定程度的不确定性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Evidence accrual technique for information assurance
Information assurance is the process of protecting information from theft, destruction, or manipulation. While many attacks are straightforward such as denial of service or viruses in that they require just a step or two to implement, more dangerous can require numerous steps to implement. Often, these steps need not be done in quick succession or even in a definite order. While techniques have been developed to behave as sensors to quickly assess elements of attacks, they rely on a decision engine to fuse the information to estimate whether or not an attack is underway. To identify such attacks, an evidence accrual system is proposed fuse information and estimate the possibility of an attack. The technique is based on a systems approach to combining information and provides nit only a level of evidence but a degree of uncertainty about the estimate.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信