Automated Intrusion Response System Algorithm with Danger Theory
暂无分享,去创建一个
[1] Eugene H. Spafford,et al. Automated adaptive intrusion containment in systems of interacting services , 2007, Comput. Networks.
[2] Yingjiu Li,et al. An intrusion response decision-making model based on hierarchical task network planning , 2010, Expert Syst. Appl..
[3] Qin Zhiguang. Technology and Application of Production Honeynet , 2004 .
[4] Salvatore J. Stolfo,et al. Toward Cost-Sensitive Modeling for Intrusion Detection and Response , 2002, J. Comput. Secur..
[5] Nora Cuppens-Boulahia,et al. An ontology-based approach to react to network attacks , 2009, Int. J. Inf. Comput. Secur..
[6] Liu Shufen. A Response Method for Cooperative Intrusions Based on the Attack Group Model , 2009 .
[7] Udo W. Pooch,et al. A Methodology for Using Intelligent Agents to provide Automated Intrusion Response , 2000 .
[8] Udo W. Pooch,et al. Intrusion damage control and assessment: a taxonomy and implementation of automated responses to intrusive behavior , 1996 .
[9] Feng Zhang,et al. Policy-Tree Based Proactive Defense Model for Network Security , 2004, GCC Workshops.
[10] Jia Chun-fu. Intrusion detection method based on hierarchical hidden Markov model and variable-length semantic pattern , 2010 .