期刊文献+

网络安全态势感知中态势评估关键技术研究 被引量:11

Research on key technology of situation assessment in network situation awareness
下载PDF
导出
摘要 提出了一种安全态势评估模型。利用反正切函数和修正函数来设计证据理论中的经验函数,将证据理论引入到安全态势评估中,对部署在网络中的多种传感器设备提供的安全数据进行关联、融合,绘制安全态势曲线,给出当前网络的安全态势。对所提出的安全态势评估模型和算法进行了测试、验证。结果表明证据理论的应用很好地解决了网络安全态势评估问题。介绍了如何将这种评估模型应用到大规模网络安全态势评估中去。 A security situation assessment model is proposed in this paper.One of the math function and the rectification function is used to design the experience function in the theory of evidence,the theory of evidence is brought into the security situation assessment.From correlating and fusing the data which is provided by the sensors deployed in the network to depict the curve of security situation,the whole process is completed.The security situation assessment model and the algorithm are verified.The results show that the problem of network security situation assessment is resolved very well by the use of the theory of evidence.At last the method how to apply this assessment model to large-scale network security situation assessment is introduced in this paper.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第19期88-92,共5页 Computer Engineering and Applications
关键词 安全态势评估 多源数据 证据理论 修正因子 security situation assessment multi-source data theory of evidence rectification factor
  • 相关文献

参考文献9

  • 1Endsley M R.Design and evaluation for situation awareness enhancement[C]//Proceedings of the Human Factors Society 32nd Annual Meeting.Santa Monica, CA: Human Factors Society, 1988:97-101.
  • 2Bass T, Gruber D.A glimpse into the future of ID[EB/OL]. (1999-09) [2006].http://www.usenix.org/publication/login/1999-9/ fea fures/future.html.
  • 3王东霞,赵刚,李远玲,等.网络安全态势感知技术[C]//全国抗恶劣环境计算机学术年会,2007.
  • 4D'Ambrosio B.Security situation assessment and response evalu- ation (SSARE)[C]//Proceedings DARPA Information Survivability Conference & Exposition II DISCE X' 01.Los Alamitos: IEEE Computer Society, 2001 : 387-394.
  • 5Yegneswaran V, Barford P, Paxson V.Using honeynets for Inter- net situation awareness[C/OL]//Proc of ACM/USENIX Hotnets IV.2005.[2008-01-12].http://www.icir.org/vern/papers/sit-aware-hot- net05.pdf.
  • 6Gorodetsky V, Karsaev O, Samoilov V.On-line update of situa- tion assessment based on asynchronous data streams[C]//Knowl- edge-Based Intelligent Information and Engineering Systems.Ber- lin, Heidelberg .. Springer, 2004 .1136-1142.
  • 7陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 8Glenn S.A mathematical theory of evidence[M].Princeton N J: Princeton University Press, 1976.
  • 9Glenn S.Perspectives on the theory and practice of belief ftmc- tions[J].Intemational Journal of Approximate Reasoning, 1990,4: 323-362.

二级参考文献1

共引文献340

同被引文献88

引证文献11

二级引证文献69

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部