| Article ID | Journal | Published Year | Pages | File Type |
|---|---|---|---|---|
| 850578 | Optik - International Journal for Light and Electron Optics | 2013 | 4 Pages |
With the development of the network, the network security has become the focus problem. How to guarantee the privacy, integrity, and availability of network information also becomes the issue to solve. This paper applies plan recognition method to recognize the network attack. First, a network attack recognition model has been built, which is more clearly to observe and recognize the process of network attack, and it is the foundation for the next work. Secondly, the temporal constraints has been added in the causal network, it can provide the help for alert correlation analysis, analyze the attack planning more effectively, predict the next action, and recognize the invalid planning. Finally, we put forward an effective method for network attack recognition based on the goal graph.
