The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust quantification is an important issue of dynamic trust management. Trust is fuzzy and dynamic, if exact math tools are used to calculate trust, there is information missing in the calculation. In this paper, we use fuzzy comprehensive evaluation method to quantify trust and propose a trust quantification algorithm. Simulation results show that the trust quantification algorithm can effectively...
In this paper, we formulate intrusion response problem as a factored Partially Observed Markov Decision Process (POMDP) model. Furthermore, a hierarchical planning algorithm is presented to decompose overall POMDP into some small sub-POMDPs and compute global optimal response policy according to MLS heuristic criterion. Meanwhile, reachable attack intention is defined and used to identify false alerts...
Internet security is seriously threatened by spam spreading, and content-based spam filtering has become one of effective spam-filtering methods. Aiming at the practical problems, we propose an active learning based method which takes naive Bayesian means as basic classifiers. This method randomly initialize a small training set to generate basic classifiers, and then use them to classify mails, which...
In recent years, automated intrusion response has become a promising research problem in network security. Several approaches have been proposed to perform an effective automated response policy. However, these approaches have some limitations, i.e., heavily depending on attack alerts and not taking in account uncertainty of system runtime state. In this paper, we present a comprehensive sequential...
The emergence kinds of Web applications offer flexible and convenient service for users. Though the sites declare they won't disclose users' privacy without user's agreement, users may receive some spam after registered in or interacted with some sites. That is clearly that some sites disclosed user's privacy such as preference with user's email address to the third party by their commerce interests...
Recently, several approaches for intrusion correlation and attack scenario analysis have been proposed. However, these approaches all focus on the flooding alert reduction or high-level alert correlation. In this paper, we study the problem of tracking and predicting of attack intentions. We use hidden Markov models to represent the typical attack scenarios and design a complete framework named HMM-AIP...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.