期刊文献+

基于变量分组贝叶斯网络的安全态势评估方法 被引量:3

A security situation assessment method based on subdividing Bayesian network in sub-networks
下载PDF
导出
摘要 针对网络安全威胁问题,将人工智能理论和相关技术与网络安全态势评估相融合,提出一种以细化变量进行分组的贝叶斯网络作为基础研究的网络安全态势评估方法。该算法可以有效减少变量数量,缩短产生贝叶斯网络的程序运行时间,并通过相关实验验证了有效地减少变量数量对最终的结果并没有产生过多影响。用本算法对大量网络实际运行数据进行测试,结果表明该方法能够很好地区分不同的网络安全威胁,从而能够有效评估网络安全态势。 Aiming at the problem of security situation awareness about networks, using artificial intelligence theory and related technologies com- bined with network security situation assessment, a network security situation awareness method based on subdividing Bayesian network is proposed. The method can effectively reduce the number of variables, shorten the running time in the progress of generating Bayesian networks. The experiment proves that the method effectively reduces the number of variables but it dosen' t have too much influence on the final results. Using the proposed algorithm, a large number of the networking operation data were tested, the experiments results show that the method is able to distinguish different network security threats so as to effectively evaluate the network security situation.
作者 董博 王雪
出处 《微型机与应用》 2016年第7期60-62,66,共4页 Microcomputer & Its Applications
关键词 贝叶斯网络 网络安全 态势评估 结构学习 Bayesian network network security situational awareness structure learning
  • 相关文献

参考文献5

二级参考文献22

  • 1陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 2Lakkaraju K, Yurcik W, Lee A J. NVisionIP: NetFlow visualizations of system state for security situational awareness [C] //Proc of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York: ACM, 2004:65-72
  • 3Yin Xiaoxin, Yurcik W, Treaster M, et al. VisFlowConnect: NetFlow visualizations of link relationships for security situational awareness [C] //Proc of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York: ACM, 2004:26-34
  • 4朱亮,王慧强,郑丽君.网络安全态势可视化研究评述[OL].[2008-01-08].http://www.paper.edu.cn/downloadpaper.php?serial_number=200607-36
  • 5Bass T. Intrusion detection systems & multisensor data fusion: Creating Cyberspace Situational Awareness [J].Communications of the ACM, 2000, 43(4): 99-105
  • 6D'Ambrosio B. Security situation assessment and response evaluation (SSARE) [C]//DISCEX'01. Proceedings: DARPA Information Survivability Conference & Exposition Ⅱ. Los Alamitos: IEEE Computer Society, 2001:387-394
  • 7Gorodetsky V, Karsaev O, Samoilov V. On-line update of situation assessment based on asynchronous data streams [C]//Knowledge Based Intelligent Information and Engineering Systems. Berlin/Heidelberg: Springer, 2004 : 1136-1142
  • 8Yegneswaran V, Barford P, Paxson V. Using Honeynets for Internet situational awareness [C/OL]//Proc of ACM/USENIX Hotnets Ⅳ. 2005 [2008-01-12]. http://www. icir. org/vern/papers/sit-aware-hotnet05. pdf
  • 9Dempster A P. Upper and lower probabilities induced by a multi-valued mapping [J]. Annals of Mathematical Statistics, 1967, 38(2): 325-339
  • 10Sharer G. A Mathematical Theory of Evidence [M]. Princeton: Princeton University Press, 1976

共引文献179

同被引文献19

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部