期刊文献+

基于云的网络安全态势预测规则挖掘算法研究 被引量:2

Algorithm of Rule Mining for Network Security Situation Prediction Based on Cloud
下载PDF
导出
摘要 现有网络安全态势预测算法对初始训练数据依赖性强,预测结果客观性差。提出了基于云的网络安全态势预测思想和基于云的网络安全态势预测规则挖掘算法。采用基于云模型的属性论域区间软划分方法解决了定性与定量转换中的区间硬性划分导致的边界元素内在联系丢失的问题。通过实验验证了算法的可行性和有效性。基于云的网络安全态势预测思想,不需要对预测算法进行数据训练,提高了网络安全态势预测的客观性。 The existing algorithms of network security situation prediction depended on the initial training data,and the objectivity of predicting results was insufficient.The thought of network security situation prediction based on cloud and an algorithm of network security situation prediction based on cloud were proposed.A soft partition method of attributes interval based on cloud model was proposed to solve the problem of that the internal relationship of boundary elements lost by hard partition method in quantitative changing to qualitative.Experimental results show that the algorithm is feasibility and effectiveness.The thought of network security situation prediction based on cloud doesn't need the initial data training,and the objectivity of predicting results is improved.
出处 《计算机与数字工程》 2010年第8期141-144,189,共5页 Computer & Digital Engineering
基金 国家"863"计划项目(编号:2009AA01Z423)资助
关键词 网络安全 云模型 态势预测 预测规则 network security cloud model situation prediction prediction rules
  • 相关文献

参考文献5

二级参考文献27

  • 1陈莉,焦李成.基于自适应聚类的数据预处理算法I[J].计算机应用与软件,2005,22(3):28-29. 被引量:9
  • 2刘胜航,张翔,曹旭平.基于层次分析法的网络风险状态评估模型[J].计算机安全,2006(2):19-21. 被引量:9
  • 3AGRAWAL R, IMICLINSKI T, SWAMI A. Database mining: a performance perspective [J]. IEEE Trans Knowledge and Data Enginnering, 1993,5:914-925.
  • 4AGRAWAL R, SRIKANT R. Fast algorithm for mining association rules [A]. MICHAEL L. Proceeding 1994 International conference Very Large Data Bases [C].Santiago, Chile: The ACM SIGMOD Anthology,1994. 487-499.
  • 5MANNILA H,TOVIVONEN H,VERKAMO A I. Efficient algorithm for discovering association rules [A]. MICHAEL L. Proceedings AAAI'94 Workshop Knowledge Discovery in Databases [C]. Seattle WA: The ACM SIGMOD Anthology,1994. 181-192.
  • 6AGRAWAL R, SHAFER J C. Parallel mining of association rules: design, implementation, and experience [J].IEEE Trans Knowledge and Data Engineering, 1996,8:962-969.
  • 7HAN Eui-hong, GEORGE K, KUMAR V. Scalable parallel data mining for association rules [A]. MICHAEL L. Proceeding of the ACM SIGMOD97 [C]. AZ USA:The ACM SIGMOD Anthology, 1997. 277-288.
  • 8AGRAWAL R, SRIKANT R. Mining sequential patterns[A]. MICHAEL L. Proceeding of International Conference Data Engineering 1995[C]. Taibei:The ACM SIGMOD Anthology, 1995.3-14.
  • 9KOPERSKI K, HAN J. Discovery of spatial association rules in geographic information databases [A]. MICHAEL L. Proceedings 4th International Sympothsis Large Spatial Databases [C]. Portland ME: The ACMSIGMOD Anthology, 1995.47-66.
  • 10LU H, HAN J W, FENG L. Stock movement and n-dimentional inter-transaction association rules [A]. MICHAEL L. Proceeding SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery [C].Seattle WA: The ACM SIGMOD Anthology, 1998.1-7.

共引文献78

同被引文献20

  • 1周建强,王为颂.舰艇近程反导作战通道性能分析[J].舰船电子工程,2008,28(12):38-41. 被引量:1
  • 2何洪成.云模型及其在指挥控制系统可靠性分析中的应用[J].火力与指挥控制,2006,31(5):76-80. 被引量:16
  • 3郭浩波,王颖龙.云理论在防空C^3I系统效能评估中的应用[J].战术导弹技术,2006(3):25-28. 被引量:18
  • 4Tim Bass.Multisensor Data Fusion for Next Generation Dis-tributed Intrusion Detection Systems[C].In Proceedings of1999IRIS National Symposium on Senor and Data Fusion,.A-merica:The Johns Hopkins University,1999:1-6.
  • 5Tim Bass.Intrusion Detection Systems and Multisensor DataFusion:Creating Cyberspace Situational Awareness[J].Com-munications of the ACM,2000,43(4):99-105.
  • 6Jason Shifflet.A Technique Independent Fusion Model forNetwork Intrusion Detection[C].Proceedings of the MidstatesConference on Undergraduates Research in Computer Scienceand Mathematics,America:Denison University,2003(1):13-19.
  • 7Stephen Lau.The Spinning Cube of Potential Doom[C].Com-munications of The ACM,2004,47(6):25-26.
  • 8Carnegie Mellcn’s SEI.System for Internet Level Knowledge(SILK)[EB/OL].http://silktools.source forge.net,2011-05.
  • 9北京理工大学信息安全与对抗技术研究中心.网络安全态势评估系统技术白皮书[EB/OL].http://~.thinkor.com/product/dowmload/网络安全态势评估系统白皮书2.doc.2011-05.
  • 10李蕾,冯浩.作战系统武器通道精度分配方法[J].中国舰船研究,2007,2(4):37-40. 被引量:10

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部