Policy-tree based proactive defense model for network security

3Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In-depth defense for network security offers promotion on robusticity and survivability of information system. It prevents attacker from damaging system even he has already broken through one or several but not all layers of the system. Proactive defense integrates in-depth defense and shows the activeness greatly in contrast with traditional defense. It predicts intrusion trend and obtains attacker's information, dynamically evaluates and responds to intrusion. This reflects the counteracting property of security. Formally defined in Z language, policy-tree model for proactive defense is proposed in this paper. Moreover, completeness, correctness and consistency are analyzed. A completely building method, an abstract for correctness validating and an auto consistency checking method on security policy are designed. Policy-tree model gives theoretical and methodological support for proactive defense. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Zhang, F., Qin, Z., & Zhou, S. (2004). Policy-tree based proactive defense model for network security. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3252, 437–449. https://doi.org/10.1007/978-3-540-30207-0_55

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free