中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
on estimating cyber adversaries capabilities: a bayesian model approach

文献类型:会议论文

作者Jiang Jianchun ; Chen Weifeng ; Ding Liping
出版日期2010
会议名称13th International Symposium on Recent Advances in Intrusion Detection Systems, RAID 2010
会议日期September
会议地点Ottawa, ON, Canada
关键词Bayesian networks Computer crime Estimation Personal computing
页码502-504
英文摘要Cyber adversaries refer to people or groups who do harm to the information system, such as hackers, espionage persons, and terrorists. Different Cyber adversaries have different motivations, and obviously, have different resources and attack techniques. The resource and attack techniques are referred to as adversaries capacities. Accurate estimation of adversaries capacities can help network administrator to use different approaches to prevent potential attacks or respond to emerging attacks. However, cyber adversaries capabilities are hidden, dynamic and difficult to observe directly. This poster aims to take a systemic approach to estimate adversaries capacities. Since we cannot obtain complete information about the adversaries, a reasonable approach is to estimate adversaries capabilities using partial information that has been observed. The estimation hypothesis, initially stating that the adversary has equal probabilities to have high level capacities and low level capacities, will be refined using Bayesian rules as we collect more evidences from network data. © 2010 Springer-Verlag.
收录类别EI
会议录Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
会议录出版地Germany
ISSN号3029743
ISBN号3642155111
源URL[http://124.16.136.157/handle/311060/8844]  
专题软件研究所_基础软件国家工程研究中心_会议论文
推荐引用方式
GB/T 7714
Jiang Jianchun,Chen Weifeng,Ding Liping. on estimating cyber adversaries capabilities: a bayesian model approach[C]. 见:13th International Symposium on Recent Advances in Intrusion Detection Systems, RAID 2010. Ottawa, ON, Canada. September.

入库方式: OAI收割

来源:软件研究所

浏览0
下载0
收藏0
其他版本

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。