期刊文献+

一种基于似然BP的网络安全态势预测方法 被引量:20

Method of Network Security Situation Prediction Based on Likelihood BP
下载PDF
导出
摘要 态势预测是网络安全态势感知的高级阶段。为了解决依赖于专家赋予权值、缺乏自学习的态势数据处理方法在复杂网络系统中的局限,提出了一种基于似然BP的网络安全态势预测方法,将BP神经网络引入态势预测领域,并用极大似然误差函数代替传统的误差函数,通过态势评估模型建立的态势序列作为训练输入序列,在反向传播过程中实现对指定参数权值的自学习调整,该方法能充分利用网络越复杂、粒度越细、效率就越高的特点,实验表明了该方法具有较好的态势预测效能,为网络安全态势预测提供了一种新的解决途径。 Situation prediction is the advanced stage of network security situation awareness. For purpose of resolving the limitations of depending on experts giving weight, lacking of self-learning on data processing in complex network system, a method of network security situation prediction based on likelihood BP was proposed. The BP neural network was introduced to the situation prediction area, and the traditional error function was replaced by the maximum likelihood error function. The situation sequences established through the situation assessment model were used as the training input sequences, and the self-learning adjustment of the appointed parameters' values was implemented in the process of back propagation training. The new method can make full use of the characteristics of the network more complex, finer grain size, the higher the efficiency. Experimental results show that the method has good performance of situation prediction,and provides a new solution for network security situation prediction.
出处 《计算机科学》 CSCD 北大核心 2009年第11期97-100,168,共5页 Computer Science
基金 国家高技术研究发展计划(863)项目(2007AA01Z449) 国家自然科学基金-广东联合基金重点项目(U0735002) 中国博士后科学基金项目(20070420793)资助
关键词 网络安全 态势感知 态势预测 神经网络 似然BP Network security, Situation awareness, Situation prediction, Neural networks, Likelihood BP
  • 相关文献

参考文献15

  • 1Endsley M R. Toward a theory of situation awareness in dynamic systems[J]. Human Factors,1995,37(1):36-24.
  • 2Batsell S G, Rao N S, Shankar M. Distributed intrusion detection and attack containment for organizational cyber security[EB/ OL]. http://www. ioc. ornl. gov/ projects/documents/containment. pdf, 2006.
  • 3王慧强,赖积保,朱亮,梁颖.网络态势感知系统研究综述[J].计算机科学,2006,33(10):5-10. 被引量:122
  • 4US Infrastructure Assurance Strategic Roadmaps. Strategies for preserving our national security[R]. Sandia National Laboratories, Sand Report. 1998 : 98-1496.
  • 5Kijewski P. ARAKIS-An early warning and attack identification system[C] //Proc of the 16^th Annual First Conference. Dudapest, Hungary, 2004.
  • 6胡华平,张怡,陈海涛,宣蕾,孙鹏.面向大规模网络的入侵检测与预警系统研究[J].国防科技大学学报,2003,25(1):21-25. 被引量:43
  • 7Gates C, Collins M, Duggan M, et al. More netflow tools:for performance and security[C] //Proc of the 18^th Large Installation Systems Administration Conference. Atlanta, Georgia, USA, 2004.
  • 8Bass T. Intrusion detection systems and multi-sensor data fusion:creating cyberspace situational awareness[J]. Communication of the ACM,2000,43(4):99-105.
  • 9陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 10赵国生,王慧强,王健.基于灰色关联分析的网络可生存性态势评估研究[J].小型微型计算机系统,2006,27(10):1861-1864. 被引量:25

二级参考文献52

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2黄遵国,卢锡城,胡华平.生存能力技术及其实现案例研究[J].通信学报,2004,25(7):137-145. 被引量:20
  • 3刘超,谢宝陵,祝伟玲,徐国明,刘万立.基于数据融合模型的网络安全分析评估系统[J].计算机工程,2005,31(13):140-141. 被引量:7
  • 4胡华平 等.网络入侵检测、预警和安全管理技术(863-104-02-02)申请书[R].,2001..
  • 5Theureau J.Use of nuclear-reactor control room simulators inresearch & development.In:7th IFAC/IFIP/IFORS/IEA Symposium on Analysis,Design and Evaluation of MAN-MACHINE SYSTEMS,Kyoto.1998.425~430
  • 6Endsley M R.Design and evaluation for situation awareness enhancement.Paper presented at the Human Factors Society 32nd Annual Meeting.Santa Monica,CA,1988
  • 7Bass T,Gruber D.A glimpse into the future of id.http://www.usenix.org/publications /login/1999-9/features/future.html,1999
  • 8Bass T.Intrusion Detection Systems and Multisensor Data Fusion:Creating Cyberspace Situational Awareness.Communications of the ACM,2000,43(4):99~105
  • 9Batsell S G,Rao N S,Shankar M.Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security.http://www.ioc.ornl.gov/projects/documents/containment.pdf,2005
  • 10Shifflet J.A Technique Independent Fusion Model For Network Intrusion Detection.Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics,2005,3(1):13~19

共引文献480

同被引文献171

引证文献20

二级引证文献273

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部