首页 | 本学科首页   官方微博 | 高级检索  
     

入侵事件建模研究
引用本文:高秀峰,陈立云,胡昌振. 入侵事件建模研究[J]. 计算机工程, 2008, 34(9): 151-153
作者姓名:高秀峰  陈立云  胡昌振
作者单位:军械工程学院计算机工程系,石家庄,050003;北京理工大学,北京,100081
基金项目:军械工程学院校科研和教改项目
摘    要:入侵过程由一系列入侵行为组成,每个入侵行为包含一个或多个入侵事件,这些事件间可能存在各种各样的关系。该文对入侵事件特征进行研究,从检测角度对入侵事件进行分类。定义了入侵事件,建立了入侵事件的一般模型。从时间、空间和功能方面分析了事件间的内在联系,并依据这些关系建立了入侵事件逻辑、统计和模糊模型,以描述不同的入侵行为,并举实例予以分析。

关 键 词:入侵事件  事件关系  事件模型
文章编号:1000-3428(2008)09-0151-03
修稿时间:2007-05-30

Study of Intrusion Events Modeling
GAO Xiu-feng,CHEN Li-yun,HU Chang-zhen. Study of Intrusion Events Modeling[J]. Computer Engineering, 2008, 34(9): 151-153
Authors:GAO Xiu-feng  CHEN Li-yun  HU Chang-zhen
Affiliation:(1. Department of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003; 2. Beijing Institute of Technology, Beijing 100081)
Abstract:Intrusion process consists of a series of intrusion behavior, which comprises one or some intrusion events. There are various relations among these intrusion events. Intrusion characteristic is studied, and intrusion events are classified by those aspects of intrusion. By defining intrusion event, common model of intrusion events is established. Based on analysis of time relations, space relations and function relations among intrusion events, the logical model, statistical model and fuzzy model are established. With these models, intrusion behavior can be represented. And it is testified by instance.
Keywords:intrusion events  event relation  event model
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号