期刊文献+

基于神经网络的网络安全态势感知

Network security situation awareness based on Neural Network
原文传递
导出
摘要 随着国家经济的发展,科学技术也在不断的提升,在此基础上形成的互联网络结构也得到了相应的发展,但是伴随着社会的复杂程度的加深,其网络安全也存在较多问题,因此,针对目前网络安全态势感知不足的问题,利用多种方式对其进行比较分析,借助网络安全态势值的非线性时间序列特点,以神经网络为核心点,处理相关的混沌与非线性数据,并以此为理论基础提出RBF神经网络,进行网络安全的态势预测。此种方法是利用RBF神经网络来明晰神经网络,并找到其中的前N个数据,以及随后的M个数据,借助专业的方法进行非线性映射关系计算,利用这种关系可以很好的进行神经网络安全态势值的预测。 with the development of national economy,science and technology are also constantly upgrading,network structure on the basis of the formation has also been a corresponding development,but with the deepening of the complexity of society,the network security also exist many problems,therefore,in view of the current network security situation awareness of the problem of insufficient use of a variety of ways carries on the comparative analysis,by using the nonlinear characteristics of time series of network security situation value,uses the neural network as the core point,treatment of chaos and nonlinear data,and on the basis of the theory put forward RBF neural network,prediction of network security situation.This kind of method is to clarify the neural network using RBF neural network,and find the first N data and M data subsequently,calculate the nonlinear mapping relationship with professional methods,the use of this relationship can predict neural network security situation is very good.
作者 汤勇峰
出处 《网络安全技术与应用》 2014年第11期46-46,48,共2页 Network Security Technology & Application
关键词 RBF神经网络 网络安全态势感知 非线性数据 RBF neural network network security situation awareness nonlinear data
  • 相关文献

参考文献4

二级参考文献40

  • 1诸葛建伟,徐辉,潘爱民.基于面向对象方法的攻击知识模型[J].计算机研究与发展,2004,41(7):1110-1116. 被引量:7
  • 2陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 3Pilz A, Swoboda J. Network management information models [J]. Aeu-International Journal of Electronics and Communications, 2004,58 : 165-171.
  • 4Esponda F, Forrest S, Helman P. A formal frame work for positive and negative detection schemes[J]. IEEE Transactions On Systems Man and Cybernetics Part B-Cybernetics, 2004,34 (1): 357-373.
  • 5Jerne N K. Towards a Network Theory of the Immune System [J].Annnual Immunology, 1974,24(3) : 125-134.
  • 6Forrest S,Perelson A S, Allen L, et al. Self-Nonself Discrimination in a Computer[C]//Proeeedings of IEEE Symposium on Research in Security and Privacy. Oakland, 1994:54-64.
  • 7Hofmeyr S A, Forrest S. Immunity by design: an artificial immune system[A]//Proc, of the Genetic and Evolutionary Computation Conference [C]. Morgan-Kaufmann, SanFrancisco, 1999:1289-1296.
  • 8Hofmeyr S A, Forrest S. Architecture for an artificial immune system[J]. Evolutionary Computation, 2000,8(4) : 443-473.
  • 9Bass T. Intrusion Detection Systems and Multisensor Data Fusion: Creation Cyberspace Situation Awareness[J].Communications of the ACM, 2000(43): 99-105.
  • 10Steinburg A N. Revision to the JDL Data Fusion Model[C]// Joint NA TO/IRIS Conference. Quebec,Oetorber 1998.

共引文献110

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部