首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于成本分析的入侵检测响应模型
引用本文:董红,邱菀华,吕俊杰.基于成本分析的入侵检测响应模型[J].北京航空航天大学学报,2008,34(1):39-42.
作者姓名:董红  邱菀华  吕俊杰
作者单位:1. 北京航空航天大学 经济管理学院, 北京 100083;
2. 北京工商大学 商学院,北京 100037
基金项目:国家自然科学基金,教育部高等学校博士学科点专项科研基金
摘    要:运用博弈论及信息安全技术有关理论,提出了一个基于成本分析的入侵响应投资模型,得出在此安全技术配置下博弈双方的最优策略,讨论了入侵响应的纳什均衡解,并通过成本分析从理论和实践两方面验证了此模型的合理性.针对现有入侵响应系统中不计成本就进行响应的问题,引入入侵损失和响应成本,通过比较二者关系,分析了系统管理员进行响应的条件成本,从而给出系统管理员灵活调整入侵响应的自适应策略,提高信息系统的安全性及抵抗攻击的能力,且避免不必要的资源浪费,实现信息保护和资源可用之间的平衡.

关 键 词:博弈论  信息安全  入侵检测  入侵响应  成本分析
文章编号:1001-5965(2008)01-0039-04
收稿时间:2007-01-22
修稿时间:2007年1月22日

Intrusion detection response model based on cost-analysis
Dong Hong,Qiu Wanhua,Lǖ Junjie.Intrusion detection response model based on cost-analysis[J].Journal of Beijing University of Aeronautics and Astronautics,2008,34(1):39-42.
Authors:Dong Hong  Qiu Wanhua  Lǖ Junjie
Institution:1. School of Economics and Management, Beijing University of Aeronautics and Astronautics, Beijing 100083, China;
2. School of Business, Beijing Technology and Business University, Beijing 100037, China
Abstract:Applying the methodologies of game theory and network security,considering the decision interdependence of the players,a game model of intrusion response based on cost analysis was presented.The study showed the optimal strategies for the players in the deployment of security technique-Intrusion Detection System(IDS),discussed the Nash equilibrium solutions,and verified the model rationality by cost-analysis from the theoretic and empirical aspects.Focusing on the problem of intrusion response without considering cost now,the model was introduced damage cost and response cost.With comparison with the two kinds of cost,the conditional cost of responding was analyzed,thus an adaptive intrusion response strategy to system administrator was made.This method can illustrate the response policy of system administrator in the actual decision further,improve security and avoid wasting unnecessary resource,then achieve the balance between information protection and resource.
Keywords:game theory  security of data  intrusion detection  intrusion response  cost analysis
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《北京航空航天大学学报》浏览原始摘要信息
点击此处可从《北京航空航天大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号