期刊文献+

基于模糊信息融合技术的攻击要素关联

Association of Attacks Factors Based on Fuzzy Information Fusion
下载PDF
导出
摘要 主要针对当前网络安全态势知识不易获得的问题,提出了自己的网络化系统安全态势评估模型并定义了攻击要素。继而使用动态的方法量化了攻击频率、攻击难易性和攻击危害度,使之可以更加精确地表示攻击次数、攻击成功的概率和攻击造成的严重后果。同时针对攻击信息的不确定性、不完整性、模糊性和多变性的特点,提出将一种模糊信息融合方法——基于Mamdani模糊推理的算法来实现攻击要素的关联。最后,应用Matlab7.0仿真实验工具进行了仿真,实验结果证明,本文提出的算法可以真实地反映安全态势情况。 Facing the current increasingly serious network scrutiny situation,model of networked system security situation evaluation and definition of attack factors is presented based on the problems.Then attack frequency,attack difficult degree and attack compromise degree are quantized by dynamic method.Because the attack information are uncertain,incomplete,intangible,changeful,a method of fuzzy information fusion-ased on Mamdani fuzzy reasoning method is put forward,applied on association of attack factors.Through using Matlab7.0 tools,the simulations about this system are done based on the methods.The experiment proves the method feasible and rational.
出处 《科学技术与工程》 2010年第27期6800-6803,6808,共5页 Science Technology and Engineering
基金 甘肃科技基金项目(GS[2008]G0408)资助
关键词 网络安全态势评估 模糊信息融合 攻击要素 关联 network security situation evaluation fuzzy information fusion attack factors association
  • 相关文献

参考文献5

二级参考文献17

  • 1王国俊.模糊逻辑:推理“细致化”[J].国际学术动态,1995(5):33-34. 被引量:6
  • 2李洪兴.从模糊控制的数学本质看模糊逻辑的成功──关于“关于模糊逻辑似是而非的争论”的似是而非的介入[J].模糊系统与数学,1995,9(4):1-14. 被引量:145
  • 3[1]Lindqvist U.On the Fundamentals of Analysis and Detection of Computer Misuse.Ph.D.Thesis,Department of Computer Engineering,Chalmers University of Technology,Gteborg, Sweden, 1995
  • 4[2]Kumer S.Classification and Detection of Computer IntrusionsPhD.Thesis,Purdue U niversity,West La fayette, Indiana, 1995-08
  • 5[3]Roesch M.Snort Docment and Sourcecode.http:∥www.snort.org.
  • 6[4]Survival Acceptability Evaluation and Incident Case Report in Taiwan.http:∥www.cer t.org.tw.
  • 7Rebecca Gurley Bace. Intrusion detection[M]. Macmillan Technical Publishing, 1999.
  • 8Sandeep Kumar. Classification and detection of computer intrusions[M]. Purdue University, WestLafayette,Indiana, 1995.
  • 9Fyodor.使用TCP/IP协议栈指纹进行远程操作系统辨识[M\OL].2000-06-30.http://www.insecure.org.
  • 10WANG Guo-jun.On the logic foundation of fuzzy reasoning[J].Information Sciences,1999,117(1):47-88.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部