首页 | 本学科首页   官方微博 | 高级检索  
     

判决PN机理论及其在入侵检测中的应用
引用本文:刘培顺,何大可. 判决PN机理论及其在入侵检测中的应用[J]. 中国铁道科学, 2005, 26(6): 131-133
作者姓名:刘培顺  何大可
作者单位:1. 西南交通大学,计算机与通信工程学院,四川,成都,610031;中国海洋大学,计算机系,山东,青岛,266071
2. 西南交通大学,计算机与通信工程学院,四川,成都,610031
基金项目:国家863计划项目(2002AA145021),铁道部科技研究开发计划项目(2002X021)
摘    要:论文针对攻击行为的知识表示和智能分析展开研究,利用Petri网理论和人工智能技术,建立适合攻击行为分析与检测的理论和方法。提出一类Petri网子类型判决PN机和着色判决PN机作为攻击行为的描述模型,利用其运行机制检测攻击,并使用着色判决PN机的有色合成解决模式关联的问题,同时

关 键 词:信息安全  入侵检测  Petri网  归纳学习  判决PN机  泛化  特化  合一
文章编号:1001-4632(2005)06-0131-03
收稿时间:2005-04-11
修稿时间:2005-04-11

Theory of Judgment PN Machine and Its Application to Intrusion Detection (Abstract of the Ph. D. Dissertation)
LIU Pei-shun,HE Da-ke. Theory of Judgment PN Machine and Its Application to Intrusion Detection (Abstract of the Ph. D. Dissertation)[J]. China Railway Science, 2005, 26(6): 131-133
Authors:LIU Pei-shun  HE Da-ke
Abstract:In this paper,knowledge representation and intelligent analysis for attacks are investigated.We put forward the theory and effective methods for the analysis and detection of attacks by Petri Net and artificial intelligence.Firstly,judgment PN machine and colored judgment PN machine are proposed which can be used to model attacks,and their running mechanisms can be used to detect the intrusion. Secondly,the problem of associated relation of models is solved by colored synthesis processes of colored judgment PN machine,and the knowledge database of IDS is updated and expanded through inductive learning.Finally,the theory of judgment PN machine is applied successfully to the Railway Ticket and Reservation Network Security System.Concretely,the following aspects are investigated deeply in this paper.1) It is shown that not all of PN machines can model attacks.For a PN machine fit for modeling attacks,there is only one transition in the PN machine pattern matching the event if it can match for the given event in current situation,otherwise it will be error.For this,two new types of PN machines fit for modeling cyber attacks,judgment PN machine and colored judgment PN machine,are proposed.The synthesis process is used to associate and simplify models,but since traditional synthesis processes such as synchronous and sharing processes can not preserve the ability of original models,the simultaneity synthesis process and the colored synthesis process are given.At the same time,it is proved that their behavior relations can keep the detection ability of original models,so they can be used to associate the attack models.
Keywords:Information security  Intrusion detec-tion  Petri net  Inductive learning  Judgment PN machine  Generalization  Specialization  Unification
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号