期刊文献+

基于隐马尔可夫模型的态势评估方法 被引量:3

Situation assessment method based on hidden Markov model
下载PDF
导出
摘要 针对目前日益复杂的网络安全环境,提出一种基于隐马尔可夫模型(HMM)的态势评估方法。以入侵检测系统的输出(报警事件)为处理对象,采用隐马尔可夫随机过程作为分析手段,建立描述网络系统受到攻击后安全状态转移的隐马尔可夫模型;在此基础上,通过Baum-Welch(BW)算法对模型参数进行优化,使用量化分析方法得到整个网络态势的定量评价。通过实验验证了该方法能比较准确地反映网络的安全态势,具有良好的应用前景。 To cope with the increasingly complex environment of network security,a situation assessment method based on hidden Markov model(HMM)was proposed.The output of intrusion detection system(alarm events)was used as the object,a hidden Markov random process was taken as an analytical tool,and a HMM was established to describe the security state transition after the network system attack.On this basis,the model parameters were optimized using Baum-Welch(BW)algorithm,and a quantitative assessment of the situation of the entire network was obtained with quantitative analysis method.The results of the experiment show this method can more accurately reflect the network′s security situation,and it has a favorable application prospect.
出处 《计算机工程与设计》 北大核心 2015年第7期1706-1711,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(61271260 61102062)
关键词 网络安全 报警事件 隐马尔可夫模型 量化分析 态势评估 network security alarm events hidden Markov model(HMM) quantitative analysis situation assessment
  • 相关文献

参考文献3

二级参考文献47

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2李辉,郑庆华,韩崇昭,管晓宏.基于多假设跟踪的入侵场景构建研究[J].通信学报,2005,26(4):70-79. 被引量:7
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 4Software Engineering Institute Carnegie Mellon. CERT Statistics [EB/OL]. [2009-01-02]. http://www. cert. org/ stats.
  • 5Arhaugh A, Fithen L, John McHugh. Windows of vulnerability: A case study analysis [J]. IEEE Computer, 2000. 33:52-29.
  • 6Skaggs B, Blackhurn B, Manes G, et al. Network vulnerability analysis [C]//Proc of the 45th IEEE Midwest Syrup on Circuits and Systems. Piscataway, NJ: IEEE, 2002:493-495.
  • 7Wales E. Vulnerability assessment tools [J]. Network Security, 2003 (7): 15-17.
  • 8Abedin M, Nessa S, AI Shacr E, et al. Vulnerability analysis for evaluating quality of protection of security policies [C]//Proc of the 2nd ACM CCS Workshop on Quality of Protection. New York: ACM, 2006:49-52.
  • 9Ahmed M, Al-Shaer E, Khan L. A novel quantitative approach for measuring network security [C] //Proc of the 27th Conf on Computer Communications. Piscataway, NJ: IEEE, 2008:1957-1965.
  • 10Ambrosio B, Takikawa M, Upper D, et al. Security situation assessment and response evaluation[C] //Proc of DARPA Information Survivability Conf & Exposition II. Piscataway, NJ: IEEE, 2001:387-394.

共引文献53

同被引文献26

引证文献3

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部