期刊文献+

项目反应理论在实时网络风险评估中的应用

Application of Item Response Theory in Real-time Network Risk Assessment
下载PDF
导出
摘要 为提高传统网络风险评估方法的准确性,针对大部分网络风险评估方法未考虑攻击能力值的问题,提出了一种基于项目反应理论的实时网络风险评估方法。该方法利用项目反应理论引入的攻击能力值参数以及服务安全等级参数,对传统攻击威胁值和攻击成功概率计算方法进行改进,并采用三标度层次分析法构建出更准确的服务重要性权重,最终获得符合网络环境的评估态势。仿真结果表明:该方法可以提高评估结果的准确度,并实时地绘制更符合真实网络环境的安全态势图。 In order to improve the accuracy of traditional risk assessment methods and solve the problem that most of risk assessment methods did not consider attack ability,this paper puts forward a risk assess-ment method for network security based on item response theory(IRT). Firstly,the attack ability intro-duced by IRT and the service security level is used to calculate the threat of attack and the success proba-bility of attack. Secondly,the three-scale analytic hierarchy process is adopted to calculate the importance weight of service accurately. Finally,the risk situation graphs are generated by the improved method. The simulation results show that this method can improve the accuracy of evaluation and get a more realistic network risk situation graph in real-time.
出处 《电讯技术》 北大核心 2015年第9期1025-1030,共6页 Telecommunication Engineering
基金 国家自然科学基金资助项目(61271260 61301122)~~
关键词 网络安全 态势感知 项目反应理论 风险态势评估 层次化 network security situational awareness item response theory risk assessment hierarchical model
  • 相关文献

参考文献11

  • 1龚正虎,卓莹.网络态势感知研究[J].软件学报,2010,21(7):1605-1619. 被引量:102
  • 2Tsai H,Huang Y. An Analytic Hierarchy Process-BasedRisk Assessment Method for Wireless Networks[J]. IEEETransactions on Reliability,2011,60(4):801-816.
  • 3Abedin M,Nessa S,Al-Shaer E,et al. Vulnerability anal-ysis for evaluating quality of protection of security policies[C] / / Proceedings of the 2nd ACM Workshop on Qualityof Protection. Alexandria,US:ACM,2006:49-52.
  • 4Sanguansat K,Chen S M. A new method for analyzingfuzzy risk based on a new fuzzy ranking method betweengeneralized fuzzy numbers[C] / / Proceedings of 2009 In-ternational Conference on Machine Learning and Cyber-netics. Baoding:IEEE,2009:2823-2827.
  • 5刘效武,王慧强,吕宏武,安述照.基于融合的网络安全态势量化感知[J].吉林大学学报(工学版),2013,43(6):1650-1657. 被引量:5
  • 6罗智勇,尤波,许家忠,梁勇.基于三层攻击图的入侵意图自动识别模型[J].吉林大学学报(工学版),2014,44(5):1392-1397. 被引量:10
  • 7Ali A,Zavarsky P,Lindskog D,et al. A Software Applica-tion to Analyze the Effects of Temporal and EnvironmentalMetrics on Overall CVSS v2 Score[C] / / Proceedings of2011 World Congress on Internet Security. London:IEEE,2011:21-23.
  • 8Baldiris S,Fabregat R,Graf S,et al. Learning ObjectRecommendations based on Quality and Item ResponseTheory[C] / / Proceedings of 2014 IEEE 14th Interna-tional Conference on Advanced Learning Technologies.Athens,Greece:IEEE,2014:34-36.
  • 9Arnold F,Pieters W,Stoelinga M I A. Quantitative pene-tration testing with item response theory[C] / / Proceed-ings of 2013 9th International Conference on InformationAssurance and Security. Gammarth,Tunisia:IEEE,2014:49-54.
  • 10刘刚,李千目,张宏.信度向量正交投影分解的网络安全风险评估方法[J].电子与信息学报,2012,34(8):1934-1938. 被引量:16

二级参考文献50

共引文献137

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部