会议专题

Modeling Multi-Level Intrusions in Z Language

In this paper, an attack specification language isconstructed based on enhanced attack tree model first,but this language is not power enough to depict somecharacters of multi-level intrusions. To address thisproblem, a more powerful language, Z language, isintroduced to define the attack schemas. In thislanguage, the representations of relations among nodesare given. Then, a construction of IP_Spoofing attackschemas exemplifies this method and how to detectIP_Spoofing attack is discussed. Based on this method,an experimental system ADIDS has been built todemonstrate the feasibility of this method.

Chao-hui Zhuang Chen-hui Yang Chang-le Zhou

Department of Computer Science,Xiamen University,Xiamen,P.R.China 361005

国际会议

The 8th International Conference on Computer Supported Cooperative Work in Design(第八届计算机支持的协同工作设计国际会议)(CSCWD2004)

厦门

英文

7-12

2004-05-26(万方平台首次上网日期,不代表论文的发表时间)