期刊文献+

网络群体对抗综合评判模型定性化研究

Comprehensive evaluation model of network group countermeasure qualitative research
下载PDF
导出
摘要 通过对网络群体攻击和防御的分析,定义了网络群体对抗的指标权重,同时提出了疫苗的克隆攻击评判策略和抗体的剪枝防御评判策略,指出对亲和力高于1的网元进行克隆攻击具有很高的攻击成功率,应将其赋予高优先级的网络攻击体系计算范围;而当网元的抗体浓度低于零时,应将其剪枝隔离,不再将其纳入评判网络防御效果的防御体系计算范围内。在此基础上建立了网络群体攻防对抗的免疫和神经网络综合评判模型,对其进行了定性化研究,为网络的群体攻防对抗仿真研究奠定了基础,并根据该模型设计了网络群体对抗评判系统,对其进行了相关分析。 Through the analysis of the network attacks and defense, this paper gave the target-weights definition of the network group countermeasure, and modeled the simulation model of network countermeasure based on the theories of neural networks and immunity. Proposed the evaluation tactics of the vaccine' cloning attack and the antibody' pruning defense from the mod- el. pointed out the phenomenon that the network element, whose affinity was higher than one, would have high success rate of cloning attacks. It should be taken into evaluation scope of network attack effects. When antibody concentration was lower than zero, the network elements should be pruned isolation avoids being incorporated into evaluation of network defense effect. Comprehensive evaluation and qualitative research of network group countermeasure were been given by using immunity and neural networks. These had been laid the foundation for the evaluation research of network group countermeasure. According to the mode, designed the network group countermeasure evaluation system and gave its related analysis.
出处 《计算机应用研究》 CSCD 北大核心 2009年第4期1500-1502,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60572162)
关键词 网络群体对抗 综合评判 克隆攻击 剪枝防御 network group countermeasure comprehensive evaluation cloning attack pruning defense
  • 相关文献

参考文献8

二级参考文献16

  • 1景旭,唐晶磊,韩永国.基于信息对抗的网络集成防御系统[J].微计算机信息,2006,22(08X):99-100. 被引量:4
  • 2Stuart McClure Joel Scambray George Kurtz.黑客大曝光--网络安全的机密与解决方案[M].北京:清华大学出版社,2002..
  • 3[1]Cohen.Fred Managing the network security game strategic security intelligence.2002
  • 4[2]Tanaka H,Sugihara K.Interval probability and its application to decision problems.The 10th IEEE International Conference on Fuzzy Systems,2001.952-955
  • 5胡晓峰,等.作战模拟术语导读[M].北京:国防大学出版社,2004.
  • 6徐一丁..分布式拒绝服务攻击(DDoS)原理及防范[EB/OL]..http://www-900.ibm.com/developerWorks/cn/security/se-ddos/index.shtml,,2002..
  • 7费爱国,王新辉译.网络中心战的效能度量[M].北京:军事科学出版社,2004.
  • 8Karanjit.S,Chris.H著,刘成武,等译.Internet防火墙与网络安全[M].机械工业出版社,1998.
  • 9Chris Brenton著,马树奇,等译.网络安全从入门到精通[M].电子工业出版社,1999.
  • 10刘水平,等."走向实战的网络战",电子对抗专业情报网论文集,1999,10.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部