期刊文献+

网络态势感知中的安全状态评估算法设计 被引量:1

Design of Security Evaluation Algorithm in Network Situation Awareness
下载PDF
导出
摘要 网络态势感知关注抽象数据与人能够理解的信息之间的转换技术。其中的网络安全评估跟一般的评估不同之处在于要给管理人员直观的显示和定位,需要自动从网络各种信息中学习。该文设计了一个颜色表示,GIS地理定位,以网络流量信息、报警信息为输入,结合神经网络和网络异常检测(蠕虫、网络攻击)算法的可自学习性的网络状态评估算法。其评价结果经过试运行证明有一定实用性。 Network Situation Awareness(NSA) pays attention to the information transform technology between the abstract data and the knowledge understood by person.Network Security Evaluation of Situation Awareness is different from normal in visualization and auto-learning from network information,for that no expert can give a result to the evaluation.This paper promote a algorithm that result in color,include GIS technique,neural network,network anomaly detection(worm,attack).It can auto-learning.input is netflow and alarm information.The experiment show that is usable in certain environment.
作者 黄玉波
机构地区 江西财经大学
出处 《煤炭技术》 CAS 北大核心 2011年第5期178-180,共3页 Coal Technology
关键词 网络异常检测 网络安全评估 神经网络 态势感知 network anomaly detection network security evaluation neural network situation awareness
  • 相关文献

参考文献4

二级参考文献18

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2[1]Tim B. Multisensor data fusion for next generation distributed intrusion detection systems[A]. 1999 IRIS National Symposium on Sensor and Data Fusion, Laurel,USA,1999.
  • 3[2]Tim B. Intrusion systems and multisensor data fusion: creating cyberspace situational awareness[J]. Communications of the ACM, 2000, 43(4): 99~105.
  • 4[3]Martin R, Chris G.Snort users manual, Snort release 2.0.0[EB/OL].http://www.snort.org/docs/SnortUsersManual.pdf,2002-07-06.
  • 5[4]Tim B, Roger R. Defense-in-depth revisited:qualitative risk analysis methodology for complex network-centric operations[EB/OL].http://www.silkroad.com/papers/pdf/archives/defense-in-depth-revisited-original.pdf,2002-07-23.
  • 6[5]Honeynet Project.Know your enemy: statistics[EB/OL].http://www.HoneyNet.org/papers/stats/, 2001-07-22.
  • 7Security Risk Analysis And Management. http://www.nr.no/-abie/RA_by_Jenkins.pdf. 2004
  • 8Casey K. Fung. A Framework for Modeling Security and Integrity in CapBasED-AMS. http://csdl2.computer.org/dl/proceedings/eee/2005/2274/O0/22740068.pdf, 2005
  • 9Kraus S. Negotiation and cooperation in Multi-agent environment.Artificial Intelligence, 1997,(94): 79-97.
  • 10ISO/IEC 17799 (BS ISO/IEC 17799: 2000). ISO Standard[S/OL]. [2006-01-26]. http://asia.bsi-global.com/Taiwan + About/BSINews/ ISO17799_translation, pd f .

共引文献433

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部