参考文献
参考文献
[1]沈昌祥.信息安全工程导论[M].北京:电子工业出版社,2003:23-28.
[2]Keith E.Strassberb,Richard J.Gondex,Gary Rollie.防火墙技术大全[M].北京:机械工业出版社,2003:162-182.
[3]李涛.网络安全概论[M].北京:电子工业出版社,2004:56-68.
[4]谢锦辉.隐Markov模型(HMM)及其在语音处理中的应用[M].武汉:华中理工大学出版社,1995:130-143.
[5]姚天任.数字信号处理[M].武汉:华中理工大学出版社,1991:316-346.
[6]谢识予.经济博弈论第2版[M].上海:复旦大学出版社,2002:20-41.
[7]哈罗德.W.库恩.博弈论经典[M].北京:中国人民大学出版社,2002:96-110.
[8]周晓俊.网络渗透测试系统研究[C].第十六届全国抗恶劣环境计算机学术年会论文集.2006:283-288.
[9]范红,吴亚非,李京春等.信息安全风险评估指南[S].北京:中国标准出版社,2007:44-45.
[10]文伟平.恶意代码机理与防范技术研究[D].北京:中国科学院软件研究所,2004:17.
[11]吴世忠.基于风险管理的信息安全保障的研究[D].成都:四川大学,2002:22.
[12]雷英杰.基于直觉模糊推理的态势与威胁评估研究[D].西安:西安电子科技大学,2005:13.
[13]方滨兴.信息安全技术发展趋势[R].2007年第二届技术创新大会,2007:101.
[14]陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897.
[15]张涛,胡铭曾,云晓春等.计算机网络安全性分析建模研究[J].通信学报,2006,26(12):100-109.
[16]张永铮,方滨兴,迟悦.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145.
[17]肖道举,杨素娟,周开锋等.网络安全评估模型研究[J].华中科技大学学报(自然科学版),2002,30(4):37-39.
[18]冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18.
[19]朱亮,王慧强,郑丽君.网络安全态势可视化研究评述[EB/OL].北京:中国科技论文在线,[2006-07-04],http://www.paper.edu.cn/releasepaper/content/200607-36.
[20]张义荣,鲜明,王国玉.一种基于网络熵的计算机网络攻击效果定量评估方法[J].通信学报,2004,25(11):159-165.
[21]李涛.基于免疫的网络安全风险检测[J].中国科学E辑,2005,35(8):798-816.
[22]梅海彬,龚俭.一种基于时间序列面向预警的警报分析方法[J].计算机科学,2007(12):72-76.
[23]蒋立新.BS7799(ISO/IEC17799)信息安全管理标准[J].世界标准化与质量管理,2004(2):46-48.
[24]陈秀真,郑庆华,管晓宏等.网络化系统安全态势评估的研究[J].西安交通大学学报,2004,38(4):404-408.
[25]姚婷婷,郑庆华,管晓宏等.一种基于主机实时流量的安全评估方法[J].西安交通大学学报,2006,40(4):415-419.
[26]张响亮,王伟,管晓宏.基于隐马尔可夫模型的程序行为异常检测[J].西安交通大学学报,30(10):1054-1059.
[27]谭小彬,王卫平,奚宏生,殷保群.计算机系统入侵检测的隐马尔可夫模型[J].计算机研究与发展,2003,40(2):245-250.
[28]李伟明,雷杰,董静,李之棠.一种优化的实时网络安全风险量化方法[J].计算机学报,2009,32(4):793-804.
[29]姜伟,方滨兴,田志宏,等.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009(4):817-826.
[30]孙薇,孔祥维,何德全,等.基于演化博弈论的信息安全攻防问题研究[J].情报科学,2008(9):1408-1412.
[31]朱建明,Raghunathan S.基于博弈论的信息安全技术评价模型[J].计算机学报,2009(4):828-834.
[32]贾春福,钟安呜,张炜,等.网络安全不完全信息动态博弈模型[J].计算机研究与发展,2006,43(z2):530-533.
[33]曹晖,王青青,马义忠.基于动态贝叶斯博弈的攻击预测模型[J].计算机应用,2007(6):1545-1547.
[34]何宁,卢昱,王磊,网络控制论在网络攻防中的应用[J].武汉大学学报理学版,2006(5):639-643.
[35]贾焰.大规模网络安全态势感知——需求、挑战与技术[EB/OL].http://2009.cert.org.cn/PPT/jiayan.pdf,2011.
[36]Cohen F.A Short Course on Compter Viruses[M].New York:John Wiley&Sons,1994:18-26.
[37]Symantec.Plymorphic virus detection module[M].United States Patent,2004:44.
[38]Waltz E,Llinas J.Multi-Sensor Data Fusion[M].Boston,MA:Artech House,1990:155-165.
[39]Hall D L.Mathematical Techniques in Multi-Sensor Data Fusion[M].Boston,MA:Artech House,1992:66-76.
[40]Hall D L,Llinas J.Handbook of Multi-Sensor Data Fusion[M].Washington,NY:CRC Press,2001:123-133.
[41]Gordon L A,Loeb M P,Lucyshyn W,Rchardson R.2006 CSI/FBI Computer Crime and Security Survery[R].Computer Security Institute Publications,2005.
[42]Anderson J P.Computer Security Threat Monitoring and Surveillance[R].Fort Washington,Pennsylvania,1980:9.
[43]Denning D E,Neumann P.G.Requirements and Model for IDES-A Real-Time Intrusion Detection System[R].Computer Science Laboratory,SRI International,Menlo Park,CA,1985:21.
[44]Julisch,K.Mining Alarm Clusters to Improve Alarm Handling Efficiency[C].Proceedings 17th Annual Computer Security Applications Conference.New Orleans,LA,2001:19.
[45]Llinas J,Hall D L.An Introduction to Multi-Sensor Data Fusion[C].Proceedings of the 1998 IEEE International Symposium on Circuits and Systems,Monterey,CA,USA,1998(6):537-540.
[46]Hall D L,Llinas J.A Challenge for the Data Fusion Community I:Research Imperatives for Improved Processing[C].Proceedings of the 7th National Symposium on Sensor Fusion,Albuquerque,NM,1994:159-175.
[47]Llinas J,Hall D L.A Challenge for the Data Fusion Community II:Research Imperatives for Improved Processing[C].Proceedings of the 7th National Symposium on Sensor Fusion,Albuquerque,NM,1994:361-374.
[48]Steinberg A N,Bowman C L,White F E.Revision to the JDL Data Fusion Model[C].Proceedings of SPIE Aero Sense,Orlando,Florida,1999(3719):430-441.
[49]Christopher J A,Sandara G B,Richard D P,et al.Operationally Critical Threat,Asset and Vulnerability Evaluation SM Framework[R].Pittsburgh,PA:Software Engineer Institue,Carnegie Mellon University,1999:77-79.
[50]Bass T,Roger R.Defense-in-Depth Revisited:Qualitative Risk Analysis Methdology for Complex Network-Centric Operations[C].Proceedings of IEEE Military Communications Conference,McLean,VA,USA,2001(1):64-70.
[51]Mehta,V.,Bartzis,C.,Zhu,H.,Clarke,E.,et al.Ranking Attack Graphs[C].Proceedings of the International Symposium on the Recent Advances in Intrusion Detection(RAID 2006).Springer-Verlag,2006:127-144.
[52]D′Amico A,Kocka M.Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Users:Lessons Learned[C].Visualization for Computer Security VizSEC 2005,Minneapolis,MN,USA,2005:302-312.
[53]Koike,H.,Ohno,K.SnortView:Visualization Systems of Snort Logs[C].2004 ACM Workshop on Visulization and Data Mining for Computer Security.Washington DC,USA:2004.143-147.
[54]Arnes,A.,Valeur,F.,Vigna,G.,Kemmerer,R.A.Using Hidden Markov Models to Evaluate the Risk of Intrusions[C].Proceedings of the International Symposium on the Recent Advances in Intrusion Detection(RAID 2006).Springer-Verlag,2006:145-164.
[55]Sunu Mathew,C.S.,Shambhu Upadhyaya.An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks[C].Proceedings of the Third IEEE International Workshop on Information Assurance(IWIA′05),College Park,MD,USA,2005:95-104.
[56]Holsopplea,J.,Yanga,S.J.,Suditb,M.TANDI:Threat Assessment of Network Data and Information[C].Proceedings of SPIE-Defense and Security Symposium,2006(6242):114-129.
[57]Chinchani,R.,Iyer,A.,Ngo,H.Q.,Upadhyaya,S.Towards a theory of insider threat assessment[C].Proceedings of the 2005 International Conference on Dependable Systems and Networks,IEEE Computer Society Press,Los Alamitos,2005:108-117.
[58]Cukier,R.M.a.M.Assessing the Attack Threat due to IRC Channels[C].Proceedings of the 2006 International Conference on Dependable Systems and Networks(DSN'06),Philadelphia,PA,2006:467-472.
[59]Wing,J.M.,Manadhata.Measuring a System's Attack Surface[C].13th USENIX Security Symposium,San Diego,CA,2004:56-63.
[60]Gehani,A.,Kedem,G.,Rheostat.Real-time Risk Management[C].Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection(RAID2004),2004:122-130.
[61]Geib,C.W.,Goldman,R.P.Plan Recognition in Intrusion Detection Systems[C].Proceedings of the DARPA Information Survivability Conference and Exposition(DISCEX II′01),2001:256-266.
[62]Kautz,H.,Allen,J.F.Generalized Plan Recognition[C].Proceedings of the Fifth National Conference on Artificial Intelligence,1986:32-38.
[63]Qin.X,Lee.W.Attack Plan Recognition and Prediction Using Causal Networks[C].Proceedings of The 20th Annual Computer Security Applications Conference(ACSAC 2004),2004:370-379.
[64]Ritchey R W,Ammann P.Using Model Checking to Analyze Network Vulnerabilities[C].Proceeding 2000 IEEE Symposium on Security and Privacy.IEEE Symposium on Security&Privacy.IEEE,2000:156-165.
[65]Sheyner,O.,Haines,J.,Jha,S.,Lippmann,R.,et al.Automated Generation and Analysis of Attack Graphs[C].Proceedings of the 2002 IEEE Symposium on Security and Privacy,2002:273-284.
[66]Templeton,S.J.,Levitt,K.A Requires/Provides Model for Computer Attacks[C].Proceedings New Security Paradigm Workshop.Ballycotton,Ireland,ACM,2001:31-38.
[67]Cuppens,F.,Miege,A.Alert Correlation in a Cooperative Intrusion Detection Framework[C].Proceedings 2002 IEEE Symposium on Security and Privacy(SP2002).Berkeley,CA,USA:IEEE Comput.Soc,2002:202-215.
[68]Dain,O.A.C.,R..Fusing a Heterogeneous Alert Stream into Scenarios[C].Proceedings of the 2001 ACM Workshop on Data Mining for Security Applications,2001:372-380.
[69]Lee,W.,Qin,X.Statistical Causality Analysis of INFOSEC Alert Data[C].Poceedings of the 6th International Symposium on Recent Advances in Intrusion Detection(RAID2003):Springer-Verlag,2003:73-94.
[70]Yin Xiaoxin,Yurcik William,Treaster Michael.VisFfowConnect:NetFlow Visualizations of Link Relationships for Security Situational Awareness[C].Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security,Washington,DC,2004:26-34.
[71]Mica R.Endsley.Design and Evaluation for Situation Awareness Enhancement[C].Proeeedings of the Human Factors society 32nd Annual Meeting,Santa Monica,CA,1988:97-101.
[72]Guo Y J.Theory and Method of Comprehensive Evaluation[M].Beijing:Science Press,2002:21.
[73]Tim Bass.Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems[A].1999 IRIS National Sympo2 Sium on Sensor and Data Fusion,Laurel,USA,1999:51.
[74]Hunte J.M,Matlack T,Schweer K G.Applications of Networking Capabilities to Assist in Situational Awareness[C].Systems and Information Engineering Design Symposium 2004,2004:25-32.
[75]Bass T.Multi-Sensor Data Fusion for Next Generation Distributed Intrusion Detection Systems[C].1999 IRIS National Symposium on Sensor and Data Fusion,Laurel,USA,1999(1):24-27.
[76]Steinberg A N,Bowman C L,White F E.Revision to the JDL Data Fusion Model[C].Proceedings of SPIE Aero Sense,Orlando,Florida,USA,1999(3719):430-441.
[77]Goldman R P,Heimerdinger W,Harp S A,et al.Information Modeling for Intrusion Report Aggregation[C].Proceedings of DARPA Information Survivability Conference&Exposition II(DISCEX′01),2001(1):329-342.
[78]Yegneswaran V,Barford P,Paxson V.Using Honeynets for Internet Situational Awareness[C].Proceedings of the Fourth Workshop on Hot Topics in Networks(HotNets-IV),College Park,MD,2005(1):1-6.
[79]Lakkaraju K,Yurcik W,Lee A J.NVisionIP:NetFlow Visualizations of System State for Security Situational Awareness[C].Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security(VizSEC/DMSEC),Washington DC,USA,2004:345-352.
[80]Yin X X,Yurcik W,Treaster M,et al.VisFlowConnect:NetFlow Visualizations of Link Relations for Security Situational Awareness[C].Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security(VizSEC/DMSEC),Washington DC,USA,2004:86-92.
[81]Haslum Kjetil,Arnes Andre.Multisensor Real-Time Risk Assessment Using Continuous-Time Hidden Markov Models[C].Proceeding of the international conference on Computational Intelligence and Security,GuangZhou,China,2006:694-703.
[82]Mehta,V.,Bartzis,C.,Zhu,H.,Clarke,E.,et al.Ranking Attack Graphs[C].Proceedings of the International Symposium on the Recent Advances in Intrusion Detection(RAID 2006),Springer-Verlag,2006:127-144.
[83]Holsopplea,J.,Yanga,S.J.,Suditb,M.TANDI:Threat Assessment of Network Data and Information[C].Proceedings of the SPIE 2006,2006(6242):114-129.
[84]Huang X D,Ariki Y,Jack M A.Hiddened Markov Models for Speech Recognition[M].Edinburgh,UK:Edinburgh University Press,1990:456-467.
[85]Huang X D,Jack M A.Unified Modeling of Vector Quantization and Hidden markov Model Using Semi-Continuous Hideden Morkov models[C].Proceedings of the ICASSP 1989,1989:639-642.
[86]Keiichiro Oura,Heiga Zen,Yoshihiko Nankaku,Akinobu Lee,Keiichi Tokuda.Hidden Semi-Markov Models Based Speech Recognition System Using Weighted Finite-State Transducer[C].Proceedings in the ICASSP 2006,2006(1):33-36.
[87]Hamilton S N,MilerW L,OttA,ata1.The Role of Game Theory in Information Warfare[C]. Proceedings of the 4th Information Survivability Workshop.Vancouver,Canada.2002:45-46.
[88]Syverson PE.A Different Look at Secure Distributed Computation[C].In:Proceedings of the 1997 IEEE Computer Security Foundations Workshop.Washington,Computer Society,1997,13(2):109-115.
[89]Nash,J.F.Equilibrium Points in N-Person Games[C].Proceedings of the National Academy of Sciences of the United States of America 36,1950:48-49.
[90]Owen G.Game Theory[M].Cambridge,Massachusetts:Acadamic Press,1982:76-91.
[91]Chen L C,Carley K M.The Impact of Countermeasure Propagation,on the Prevalence of Computer Viruses[J].IEEE Transactions on Systems Man and Cybernetics Part B-Cybernetics.2004,34(2):823-833.
[92]Feng DG,Zhang Y,Zhang YQ.Survey of Information Security Risk Assessment[J].Journal of China Institute of Communications,2004,25(7):10-18.
[93]Hariri S,Qu G Z,Dharmagadda T,et al.Impact Analysis of Faults and Attacks in Large Scale Networks[J].IEEE Security&Privacy.2003,1(5):49-54.
[94]Arnold W,Tesauro G.Automatically Generated Win32 Heuristic Virus Detection[J].Proceedings of the 2000 International Virus Bulletin Conference,2000:484-495.
[95]Goodall,J.R.,Lutters,W.G.,Komlodi,A.The Work of Intrusion Detection:Rethinking the Role of Security Analyst[J].Proceedings of the Tenth Americas Conference on Information Systems.New York,2004:492-499.
[96]Ammann,P.,Wijesekera,D.,Kaushik,S.Scalable,Graph-based Network Vulnerability Analysis[J].Proceedings of 9th ACM Conference on Computer and Communications Security.Washingtion,DC,2002:148-160.
[97]Hall D L,Llinas J.An Introduction to Multisensor Data Fusion[J].Proceedings of the IEEE,1997,85(1):6-23.
[98]Roesch,M.Snort-Lightweight Intrusion Detection for Network[J]Proceedings of the USENIX LISA′99 Conference,Seattle,Washington,1999:25-37.
[99]Kruegel,C.,Robertson,W.Alert Verification:Determining the Success of Intrusion Attempts[J].Proc.First Workshop the Detection of Intrusions and Malware and Vulnerability Assessment(DIMVA 2004),Dortmund,Germany,2004:186-195.
[100]Porras,P.A.,Fong,M.W.,Valdes,A.A Mission-Impact-based Approach to INFOSEC Alarm Correlation[J].Poceedings of the 5th International Symposium on Recent Advances in Intrusion Detection(RAID2002).Zurich,Switzerland,2002:95-101.
[101]Hariri,S.,Qu,G.,Dharmagadda,T.Impact Analysis of Faults and Attacks in Large-scale Networks[J].IEEE Security&Privacy,2003(1):49-54.
[102]Blyth,A.Footprinting for Intrusion Detection and Threat Assessment[J].Information Security Technical Report,1999,4(3):43-53.
[103]Jonsson,E.,Olovsson,T.A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior[J].IEEE Transactions on Software Engineering,1997 23(4):235-245.
[104]Schmidt,C.,Sridharan,N.,Goodson,J.The Plan Recognition Problem:an Intersection of Psychology and Artificial Intelligence[J].Artificial Intelligence,1978(11):45-83.
[105]Charniak,E.,Goldman,R.P.A Probabilistic Model of Plan Recognition[C].Proceedings of the Ninth National Conference on Artificial Intelligence,1991:160-165.
[106]Wang,L.,Liu,A.,Jajodia,S.Using Attack Graphs for Correlating,Hypothesizing,and Predicting Intrusion Alerts[J].Computer Communications,2006(29):2917-2933.
[107]Cunningham,W.H.Optimal Attack and Reinforcement of a Network[J].Journal of the ACM(JACM),1985,32(3):549-561.
[108]Hellerstein,J.L.,Ma,S.,Perng,C.-S.Discovering Actionable Patterns in Event Data[J].IBM Systems Journal,2002,41(3):475-482.
[109]Ning P,Cui Y.Techniques and Tools for Analyzing Intrusion Alerts[J].ACM Transaction on Information and System Security,2004,7(2):274-318.
[110]Miea R.Endsley.Toward a Theory of Situation Awareness in Dynamic Systems[J].Human Factors Journal,1995,37(l):32-64.
[111]Zhuang Y,Yang Y,Wu F,et al.Manifold Learning Based Cross-media Retrieval:A Solution to Media Object Complementary Nature[J].The Journal of VLSI Signal Processing,2007,46(2-3):153-164.
[112]Bass T.Intrusion Detection Systems and Multi-Sensor Data Fusion:Creating Cyberspace Situational Awareness[J].Communications of the ACM,2000,43(4):99-105.
[113]Lau S.The Spinning Cube of Potential Doom[J].Communications of the ACM.2004,47(6):25-26.
[114]L.E.Baum,Petrie,T.Statistical Inference for Probabilistic Functions of Finite State Markov Chains[J].Ann.Math.Stat,1966(37):1554-1563.
[115]Huang X D.Phoneme Classification Using Semicontinuous Hidden Markov Models[J].IEEE Trans.SP,1992,40(5):1062-1067.
[116]Shun-Zheng Yu.Hidden Semi-Markov Models[J].Artificial Intelligence,2010(174):215-243.
[117]S.E.Levinson.Continuously Variable Duration Hidden Markov Models for Automatic Speech Recognition[J].Computer Speech and Language,1986(1):29-45.
[118]Ostendorf M,Digalakis V and Kimball O.From HMMs to Segment Models[J].IEEE Transactions on Speech&Audio Processing,1996,4(5):360-378.
[119]M.T.Johnson,Capacity and Complexity of HMM Duration Modeling Techniques[J].IEEE Signal Processing Letters,2005,12:407-410.
[120]LyeKong-wei,Jeannette M W.Game Strategies in Network Security[J].International Jounral of Information Security,2005,4(1-2):71-86.
[121]Nash,J.F.Non-Cooperative Games[J].Annals of Mathematics,1951:86-295.
[122]CERT.http://www.cert.org.2011-3-1.
[123]Symantec Corporation.Symantec Internet Security Threat Report[EB/OL].Volume IX,2006,http://eval.symantec.com/mktginfo/enterprise/white_papers/ent_white paper_symantec_internet_security_threat_report_ix.pdf.
[124]ISS.Internet Security System[EB/OL].http://www.iss.net.2011.
[125]SATAN.Security Administrator Tool for Analyzing Networks[EB/OL].http://www.procupine.org/satan.2011.
[126]Nmap[EB/OL].http://nmap.org.2011.
[127]Nessus[EB/OL].http://www.nessus.org/nessus/.2011.
[128]X-Scan[EB/OL].http://www.xfocus.net/tools/200507/1057.html.2011.
[129]CVE.Common Vulnerabilities and Exposures[EB/OL],http://www.cve.mitre.org/,2008.
[130]Bugtraq.http://www.securityfocus.com/archive/1[EB/OL],2008.
[131]CVSS.Common Vulnerability Scoring System[EB/OL].http://nvd.nist.gov/cvss.cfm,2008.
[132]Deraison,R.Nessus Vulnerability Scanner[EB/OL].http://www.nessus.org/.2008.
[133]Danyliw,R.ACID:Analysis Console for Intrusion Databases[EB/OL].http://acidlab.sourceforge.net.2001.
[134]OSSIM.Open Source Security Information Management[DB/OL].http://www.ossim.net/,2008.
[135]Small Business Innovation Research Program[DB/OL].https://www.dhs.gov/science-and-technology/sbir,2005.
[136]Advanced Research and Development Activity(ARDA)[EB/OL].Exploratory Program Call for Proposals 2006,USA,2005.
[137]Project H.Scan 17[EB/OL].http://www.honeynet.org/scans/scan17.2002.
[138]Project H.Know your enemy:Statistics[DB/OL].http://www.honeynet.org/papers.2002.
[139]Kevin P.Murphy.Hidden semi-Markov models(HSMM)[DB/OL].www.ai.mit.edu/~murphyk.2002.