期刊文献+

基于D-S证据理论的脆弱性态势数据融合方法研究 被引量:3

RESEARCH ON VULNERABILITY SITUATIONAL DATA FUSION METHOD BASED ON D-S EVIDENCE THEORY
下载PDF
导出
摘要 将基于D-S证据理论的融合算法应用在态势感知领域的脆弱性态势数据处理中,对网络扫描和主机扫描等多种手段得到的脆弱性数据进行融合与分析。通过对脆弱性数据进行规格化,构造概率分配及融合处理,有效利用多源数据的冗余性、互补性,实现了对多个扫描结果的综合。结果表明此方法得到的结果更加全面可靠。 We apply the D-S evidence theory-based fusion algorithm to vulnerability situational data processing in situational awareness domain, and fuse and analyse the vulnerability data acquired by diverse means of network scanning and host scanning, etc. Though normalising the vulnerability data to construct the probability assignment and carry out fusion and processing, we make efficient use of the redundancy and complementarity of multi-source data and implement the integration of multiple scanning results. Outcome shows that the results obtained by this method are more comprehensive and reliable.
出处 《计算机应用与软件》 CSCD 北大核心 2013年第9期84-87,共4页 Computer Applications and Software
基金 国家高技术研究发展计划项目(2011AA01A103) 长江学者和创新团队发展计划项目(IRT1012) 湖南省自然科学基金项目(11JJ7003)
关键词 态势感知 数据融合 D-S证据理论脆弱性 漏洞扫描 Situational awareness Data fusion D-S evidence theory Vulnerability Vulnerability scanning
  • 相关文献

参考文献15

  • 1王馨,刘海砚,季晓林,等.信息融合技术的发展与展望[J].仪器仪表学报,2007,28(4 增刊):175 -179.
  • 2于洪珍,徐立忠,王慧斌.监测监控信息融合技术[M].北京:清华大学出版社,2011.
  • 3Bass T. Service-Oriented Horizontal Fusion in Distributed Coordination-Based Systems[J]. IEEE MILCOM,2004.
  • 4Salerno J J, Hinman M, Boulware D. A situation awareness model ap-plied to multiple domains [ C] //Proceedings of the Defense and Securi-ty Conference,Orlando,FL,USA,2005 :65 ~74.
  • 5刘效武,王慧强,赖积保,叶海智.基于多源异质融合的网络安全态势生成与评价[J].系统仿真学报,2010,22(6):1411-1415. 被引量:13
  • 6Siaterlis C, Maglaris B. Towards Multisensor Data fusion for DDOS De-tection [ C]//Proc of the 2004 ACM Symp on Applied Computing,2004:439-446.
  • 7Lu J, Yang X, Zhang G. Support vector machine-based muiti-sourcemulti-attribute information integration for situation assessment [ J]. Ex-pert Systems with Application,2008,34 (2) : 1333 —1340.
  • 8赖积保,王慧强,郑逢斌,冯光升.基于DSimC和EWDS的网络安全态势要素提取方法[J].计算机科学,2010,37(11):64-69. 被引量:7
  • 9王宏,刘渊.扩展D-S证据理论在网络异常检测中的研究[J].计算机工程与应用,2011,47(34):117-121. 被引量:3
  • 10Dempster A P. Upper and Lower Probabilities Induced by a MultivaluedMapping [J]. The Annals of Mathematical Statistics, 1967,38 (2):325 -339.

二级参考文献38

共引文献42

同被引文献22

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部