An intrusive intention recognition model based on network security states graph

  • Authors:
  • Wang Zhigang;Peng Wu

  • Affiliations:
  • School of Mechanics and Electronics, Beijing Institute of Technology, Beijing, China;School of Mechanics and Electronics, Beijing Institute of Technology, Beijing, China

  • Venue:
  • WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Intrusive intention is the high level goal of an attacker that he want to achieve. To identify the real intentions of an attacker can support decision-making of the network security administrator. In this paper a method based on network security states graph to recognize intrusive intention is presented. Algorithms of intention recognition and threat assessment offer a way to assess the network security situation. Feasibility and validity of this method are proved from the experiments.