Article ID Journal Published Year Pages File Type
850578 Optik - International Journal for Light and Electron Optics 2013 4 Pages PDF
Abstract

With the development of the network, the network security has become the focus problem. How to guarantee the privacy, integrity, and availability of network information also becomes the issue to solve. This paper applies plan recognition method to recognize the network attack. First, a network attack recognition model has been built, which is more clearly to observe and recognize the process of network attack, and it is the foundation for the next work. Secondly, the temporal constraints has been added in the causal network, it can provide the help for alert correlation analysis, analyze the attack planning more effectively, predict the next action, and recognize the invalid planning. Finally, we put forward an effective method for network attack recognition based on the goal graph.

Related Topics
Physical Sciences and Engineering Engineering Engineering (General)
Authors
, ,