Netinfo Security ›› 2021, Vol. 21 ›› Issue (6): 26-35.doi: 10.3969/j.issn.1671-1122.2021.06.004
Previous Articles Next Articles
LIU Jing*(), ZHANG Yuchen, ZHANG Hongqi
Received:
2021-01-21
Online:
2021-06-10
Published:
2021-07-01
Contact:
LIU Jing*
E-mail:cybersecuritys@163.com
CLC Number:
LIU Jing*, ZHANG Yuchen, ZHANG Hongqi. Automatic Intrusion Response Decision-making Method Based on Q-Learning[J]. Netinfo Security, 2021, 21(6): 26-35.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2021.06.004
$A({{s}_{2}})$ | $A({{s}_{3}})$ | $A({{s}_{4}})$ | $A({{s}_{5}})$ | $A({{s}_{6}})$ |
---|---|---|---|---|
${{a}_{1}}$ | ${{a}_{1}}$ | ${{a}_{1}}$ | ${{a}_{1}}$ | ${{a}_{1}}$ |
${{a}_{2}}$ | ${{a}_{2}}$ | ${{a}_{2}}$ | ${{a}_{3}}$ | ${{a}_{3}}$ |
${{a}_{4}}$ | ${{a}_{3}}$ | ${{a}_{3}}$ | ${{a}_{4}}$ | ${{a}_{5}}$ |
${{a}_{7}}$ | ${{a}_{4}}$ | ${{a}_{9}}$ | ${{a}_{5}}$ | ${{a}_{9}}$ |
${{a}_{8}}$ | ${{a}_{5}}$ | ${{a}_{6}}$ | ${{a}_{10}}$ | |
${{a}_{6}}$ | ${{a}_{10}}$ | ${{a}_{11}}$ |
[1] | ZHANG Hengwei, HUANG Shirui. Markov Differential Game Model and Its Application in Network Security[J]. Acta Electronica Sinica, 2019,47(3):606-612. |
张恒巍, 黄世锐. Markov 微分博弈模型及其在网络安全中的应用[J]. 电子学报, 2019,47(3):606-612. | |
[2] | QIAN Yaguan, LU Hongbo, JI Shouling, et al. A Poisoning Attack on Intrusion Detection System Based on SVM[J]. Acta Electronica Sinica, 2019,47(1):59-65. |
钱亚冠, 卢红波, 纪守领, 等. 一种针对基于 SVM 入侵检测系统的毒性攻击方法[J]. 电子学报, 2019,47(1):59-65. | |
[3] | SRINIVASAN T, SESHADRI J, JONATHAN J, et al. A System for Power-aware Agent-based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks[J]. Lecture Notes in Computer Science, 2005,3619(4):153-162. |
[4] |
INAYAT Z, GANI A, ANUAR N B, et al. Intrusion Response Systems: Foundations, Design, and Challenges[J]. Journal of Network and Computer Applications, 2016,62(2):53-74.
doi: 10.1016/j.jnca.2015.12.006 URL |
[5] |
ANWAR S, ZAIN M J, ZOLKIPLI M F, et al. From Intrusion Detection to An Intrusion Response System: Fundamentals, Requirements, and Future Directions[J]. Algorithms, 2017,10(2):1-24.
doi: 10.3390/a10010001 URL |
[6] |
KHOLIDY H A, ERRADI A, ABDELWAHED S, et al. A Risk Mitigation Approach for Autonomous Cloud Intrusion Response System[J]. Computing, 2016,98(11):1111-1135.
doi: 10.1007/s00607-016-0495-8 URL |
[7] |
SHAMELI-SENDI A, LOUAFI H, HE Wenbo, et al. Dynamic Optimal Countermeasure Selection for Intrusion Response System[J]. IEEE Transactions on Dependable and Secure Computing, 2016,15(5):755-770.
doi: 10.1109/TDSC.8858 URL |
[8] |
WU Y S, FOO B R, MAO Yuchun, et al. Automated Adaptive Intrusion Containment in Systems of Interacting Services[J]. Computer Networks, 2007,51(5):1334-1360.
doi: 10.1016/j.comnet.2006.09.006 URL |
[9] | UPPULURI P, SEKAR R. Experiences with Specification-based Intrusion Detection[C]// Springer. International Symposium on Recent Advances in Intrusion Detection, October 10-12, 2001, Davis, CA, USA. Heidelberg: Springer, 2001: 172-189. |
[10] | SHI Jin, LU Yin, XIE Li. Dynamic Intrusion Response Based on Game Theory[J]. Journal of Computer Research and Development, 2008,45(5):747-757. |
石进, 陆音, 谢立. 基于博弈理论的动态入侵响应[J]. 计算机研究与发展, 2008,45(5):747-757. | |
[11] | SCHNACKENGERG D, HOLLIDAY H, SMITH R, et al. Cooperative Intrusion Traceback and Response Architecture (CITRA)[C]// IEEE. DARPA Information Survivability Conference & Exposition II, June 12-14, 2001, Anaheim, CA, USA. NJ: IEEE, 2001: 56-68. |
[12] |
NADEEM A, HOWARTH M P. An Intrusion Detection & Adaptive Response Mechanism for MANETs[J]. Ad Hoc Networks, 2014,13(2):368-380.
doi: 10.1016/j.adhoc.2013.08.017 URL |
[13] |
MU Chengpo, LI Yingjiu. An Intrusion Response Decision-making Model Based on Hierarchical Task Network Planning[J]. Expert Systems with Applications, 2010,37(3):2465-2472.
doi: 10.1016/j.eswa.2009.07.079 URL |
[14] | STAKHANOVA N, BASU S, WONG J. A Cost-sensitive Model for Preemptive Intrusion Response Systems[C]// IEEE. 21st International Conference on Advanced Information Networking and Applications, May 21-23, 2007, Niagara Falls, ON, Canada. NJ: IEEE, 2007: 428-435. |
[15] | HEI H, HOEGG C L, MCANDREW K, et al. It Rained What in Where? A Collaborative Approach to Improve Response and Remediation of Water Intrusions in Clinical Areas[J]. American Journal of Infection Control, 2020,48(8):27. |
[16] | CARVER C A. Adaptive Agent-based Intrusion Response[D]. College Station: Texas A&M University, 2001. |
[17] | HUTTER F, KOTTHOFF L, VANSCHOREN J. Automated Machine Learning: Methods, Systems, Challenges[M]. Heidelberg:Springer Nature, 2019. |
[18] | YE Yun, XU Xishan, QI Zhichang, et al. Attack Graph Generation Algorithm for Large-scale Network System[J]. Journal of Computer Research and Development, 2013,50(10):2133-2139. |
叶云, 徐锡山, 齐治昌, 等. 大规模网络中攻击图自动构建算法研究[J]. 计算机研究与发展, 2013,50(10):2133-2139. | |
[19] | WANG Shuo, TANG Guangming, KOU Guang, et al. Attack Path Prediction Method Based on Causal Knowledge Net[J]. Journal on Communications, 2016,37(10):188-198. |
王硕, 汤光明, 寇广, 等. 基于因果知识网络的攻击路径预测方法[J]. 通信学报, 2016,37(10):188-198. | |
[20] | GHOSAL S, AAD V. Fundamentals of Nonparametric Bayesian Inference[M]. Cambridge: Cambridge University Press, 2017. |
[21] | YANG Zhuoran, XIE Yuchen, WANG Zhaoran. A Theoretical Analysis of Deep Q-learning[EB/OL]. https://www.researchgate.net/publication/330102327_A_Theoretical_Analysis_of_Deep_Q-Learning , 2020-12-20. |
[1] | Bin-ting SU, He FANG, Li XU. Q-Learning-based Routing Protocol for the Balance of WSN Lifetime [J]. Netinfo Security, 2015, 15(4): 74-77. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||