跳至主導覽 跳至搜尋 跳過主要內容

Intrusion-detection for incident-response, using a military battlefield-intelligence process

  • J. Yuill
  • , F. Wu
  • , J. Settle
  • , F. Gong
  • , R. Forno
  • , M. Huang
  • , J. Asbery

研究成果: Article同行評審

25   !!Link opens in a new tab 引文 斯高帕斯(Scopus)

摘要

A network device is considered compromised when one of its security mechanisms is defeated by an attacker. For many networks, an attacker can compromise many devices before being discovered. However, investigating devices for compromise is costly and time-consuming, making it difficult to investigate all, or even most, of a network's devices. Further, investigation can yield false-negative results. This paper describes an intrusion-detection (ID) technique for incident-response. During an attack, the attacker reveals information about himself and about network vulnerabilities. This information can be used to identify the network's likely compromised devices (LCDs). Knowledge of LCDs is useful when limited resources allow only some of the network's devices to be investigated. During an on-going attack, knowledge of LCDs is also useful for tactical planning. The ID technique is based on the US military's battlefield-intelligence process. Models are constructed of the network, as the battlespace. Also, models are constructed of the attacker's capabilities, intentions, and courses-of-action. The Economics of Crime, a theory which explains criminal behavior, is used to model the attacker's courses-of-action. The models of the network and the attacker are used to identify the devices most likely to be compromised.

原文English
頁(從 - 到)671-697
頁數27
期刊Computer Networks
34
發行號4
DOIs
出版狀態Published - 2000 10月

UN SDG

此研究成果有助於以下永續發展目標

  1. SDG 16 - 和平、公正和健全的機構
    SDG 16 和平、公正和健全的機構

All Science Journal Classification (ASJC) codes

  • 電腦網路與通信

指紋

深入研究「Intrusion-detection for incident-response, using a military battlefield-intelligence process」主題。共同形成了獨特的指紋。

引用此