期刊文献+

基于关联规则挖掘的关键基础设施安全事件分析

Analysis of Critical Infrastructure Reports Based on Association Rules Mining
下载PDF
导出
摘要 在计算机技术迅猛发展和网络技术逐步普及的今天,信息技术已经渗入了社会的各个领域,关键基础设施作为现代社会得以正常运转的支撑体系,对信息技术的依赖不断加深,但由于网络的互联性与交互性,使得关键基础设施正面临着越来越严峻的安全威胁。如何进行关键基础设施保护成为亟待解决的问题。文中基于开源渠道获得涉及关键基础设施保护的安全事件,利用数据挖掘中关联规则分析的方法,通过对事件相关属性(如事件的类型、发生的途径、时间、造成的伤害、涉及人员及影响范围等)进行关联挖掘,分析各因素之间的潜在联系,最终生成强联系规则数据库,作为可辅助决策的知识信息,以帮助对关键基础设施进行有针对性的保护和对安全事件的预测防范。 With the rapid development of computer and network technology, information technology has infiltrated all areas of society. Critical infrastructure, as a supporting system to make modem society function normal,is increasingly dependent on information technolo- gy. However, due to the connectivity and interactivity of network, critical infrastructure is facing the increasingly severe dangers. How to protect the critical infrastructure has become an urgent problem. In this paper,the data mining technology including the association rules mining is applied. Analyze the critical infrastructure reports from open sources, mine the hidden relationships among data to identify the relationship between the key elements in the reports and form the database of strong association rules. The database of strong association rules can help professinals make decisions on how to protect the critical infrastructure pertinently and forecast security incidents.
出处 《计算机技术与发展》 2015年第10期154-159,165,共7页 Computer Technology and Development
基金 国家自然科学基金资助项目(61170285)
关键词 关键基础设施 数据挖掘 关联规则 APRIORI算法 critical infrastructure data mining association rules Apriori algorithm
  • 相关文献

参考文献19

  • 1Rinaldi S A, Peerenboom J P, Kelly T K. Identifying, under- standing, and analyzing critical infrastructure interdependen- cies[ J]. IEEE Control Systems,2001,21 (6) :11-25.
  • 2Simon R, Teperman S. The world trade center attack : lessons for disaster management[ J ]. Critical Care,2002,5 ( 6 ) :318- 320.
  • 3The Washington Post. Cyber incident blamed for nuclear power plant shutdown [ EB/OL ]. 2008 - 06 - 04. http ://articles. washingtonpost, com/2008 - 06 - 04/news/36929595 _ 1 _ sys- tems -computer-nuclear-regulatory-commission.
  • 4Falliere N, Murchu L O, Chien E. W32. Stuxnet Dossier[ M ]. [s. 1. ] :Symantec Corp,2011,.
  • 5Lee D. Flame : massive cyber- attack discovered, researchers say[ N]. BBC News,2012-05-29.
  • 6Duqu:a Stuxnet-like malware found in the wild[ R]. [ s. 1. ] : Laboratory of Cryptography of Systems Security ( CrySyS ), 2011.
  • 7人民网.欧美电站感染“能源之熊”病毒,黑客控制电厂[ EB/OL ]. 2014 - 07 - 02. http ://world. people, com. cn/n/ 2014/0701/c1002-25223899. html.
  • 8Ham H, Kim T J, Boyce D. Assessment of economic impacts from unexpected events with an interregional commodity flow and muhimodal transportation network model [ J ]. Transporta- tion Research Part A:Policy and Practice,2005,39(10) :849 -860.
  • 9王建伟,荣莉莉.基于袭击的复杂网络上的全局相继故障[J].管理科学,2009,22(3):113-120. 被引量:10
  • 10韩传峰,张超,刘亮.关键基础设施网络连锁反应模型[J].系统仿真技术,2010,6(2):121-125. 被引量:10

二级参考文献47

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部