• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Yuling, Du Ruizhong, Zhao Weidong, and Cai Hongyun. BPCRISM: A New Intrusion Scenario Building Model[J]. Journal of Computer Research and Development, 2007, 44(4): 589-597.
Citation: Liu Yuling, Du Ruizhong, Zhao Weidong, and Cai Hongyun. BPCRISM: A New Intrusion Scenario Building Model[J]. Journal of Computer Research and Development, 2007, 44(4): 589-597.

BPCRISM: A New Intrusion Scenario Building Model

More Information
  • Published Date: April 14, 2007
  • Intrusion detection system (IDS) is the new generation of security-safeguard technology followed firewall and data encryption. Aiming at the same attack, traditional intrusion detection system (IDS) produce a lot of the repeated alerts which have quite difference in content, emphasis and uncertainty, because of its heterogeneity and autonomy. But by analyzing these alerts, the performance of IDS is reduced and the integrated intrusion course and scenario cannot be obtained. In order to analyze and deal the alerts effectively and to rebuild the attack flow and the attack scenario, a new intrusion scenario building model—BPCRISM (based probability and causal relation intrusion scenario model) that combines probabilistic correlation with causal correlation is presented in this paper. The method of the alert relation can be divided into two major categories: probabilistic alert correlation and based causal relation alert correlation, and then algorithms of two alert correlation methods are given. The integrated intrusion course can be identified and the intrusion scenario is built from the correlation alerts. Realizing this model tentatively, experiments are performed by using DARPA Cyber Panel Program Grand Challenge Problem Release 3.2 (GCP), which is an attack scenario simulator, and the effectiveness of the model is verified. This model can solve the problems a single traditional intrusion detection system brings.
  • Related Articles

    [1]Wang Jianwei, Hao Zhongxiao. Node Probability Query Algorithm in Probabilistic XML Document Tree[J]. Journal of Computer Research and Development, 2012, 49(4): 785-794.
    [2]Meng Xiangfu, Yan Li, Zhang Wengbo, Ma Zongmin. XML Approximate Query Approach Based on Attribute Units Extension[J]. Journal of Computer Research and Development, 2010, 47(11): 1936-1946.
    [3]Liu Xiping, Wan Changxuan, and Liu Dexi. Effective XML Vague Content and Structure Retrieval and Scoring[J]. Journal of Computer Research and Development, 2010, 47(6): 1070-1078.
    [4]Yang Weidong and Shi Baile. A Survey of XML Stream Management[J]. Journal of Computer Research and Development, 2009, 46(10): 1721-1728.
    [5]Wang Xin, Yuan Xiaojie, Wang Chenying, and Zhang Haiwei. XN-Store: A Storage Scheme for Native XML Databases[J]. Journal of Computer Research and Development, 2008, 45(7).
    [6]Wan Jing, Hao Zhongxiao. Study of Multi-Valued Dependency in Strong Total Order Temporal Scheme with Multiple Time Granularities[J]. Journal of Computer Research and Development, 2008, 45(6).
    [7]Wu Yonghui. The Sufficient and Necessary Condition for No Implicit Redundancies in an XML Schema[J]. Journal of Computer Research and Development, 2007, 44(12): 2106-2111.
    [8]Hao Zhongxiao, Li Yanjuan. Normalization of Temporal Scheme with Respect to Temporal Multivalued Dependency with Multiple Time Granularities[J]. Journal of Computer Research and Development, 2007, 44(5): 853-859.
    [9]Lü Teng, Yan Ping. Functional Dependencies and Inference Rules for XML[J]. Journal of Computer Research and Development, 2005, 42(5): 792-796.
    [10]Zhang Zhongping, Wang Chao, Zhu Yangyong. Constraint-Based Normalization Algorithms for XML Documents[J]. Journal of Computer Research and Development, 2005, 42(5): 755-764.

Catalog

    Article views (517) PDF downloads (732) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return