期刊文献+

基于进化神经网络模型的网络安全态势要素提取方法研究 被引量:1

下载PDF
导出
摘要 针对网络安全态势要素提取不全面和不准确的近况,以神经网络模型为基础,展开了基于遗传进化算法的进化神经网络模型的网络安全态势要素提取方法研究。拟使用遗传进化算法对神经网络结构进行优化,进而建立一种进化神经网络模型。研究表明,在该种模型下,对提取大量网络安全状态数据中的态势要素的精确度方面有了很大程度的提升,此外,还能对其进行较为广泛的推广和普及。同时,为实现网络安全态势感知的实现提供了一个全新的想法和突破点,可以证实该模型的准确性和有效性。
作者 易飞
出处 《电子世界》 2016年第22期104-104,106,共2页 Electronics World
  • 相关文献

参考文献2

二级参考文献18

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2Tim Bass. Intrusion Detection System and Multi-Sensor Data Fusion[J]. Communications of the ACM, 2000, 43 (4) : 99 - 105.
  • 3Robert Ball, Glenn A. Fink. Home-Centric Visualization of Network Traffic for Security Administration[ C] // Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. Washington DC, Oct., 2004:55 - 64.
  • 4Soon Tee Teoh, Kwan Liu Ma, S Felix Wu, et al. Case Study: Interactive Visualization for Internet Security[ C] //Proceedings of IEEE VIS. Boson, Oct., 2002:505 - 508.
  • 5Gregory Conti, Kulsoom Abdullah. Passive Visual Fingerprinting of Network Attack Tools[ C]//Proceedings of the 2004 ACM workshop on VizSEC/DMSEC. Fairfax, Oct., 2004 : 45 - 54.
  • 6Kiran Lakkaraju, William Yurcik, Adam J Lee. NVision- IP: NetFlow Visualizations of System State for Security Situational Awareness[ C]// Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. ACM Press, New York: USA, Oct., 2004:65 - 72.
  • 7Phillip A Porras, Richard A Kemmerer. Penetration State Transition Analysis A Rule-Based Intrusion Detection Approach[ C]//Proceedings of the 8th Annual Computer Security Applications Conference. San Antonio, Nov., 1992: 220 - 229.
  • 8Jason Shifflet. A Technique Independent Fusion Model for Network Intrusion Detection[ C]//Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics. Granville, Oct., 2004:13 - 19.
  • 9Stephen G Batsell, Nageswara S Rao, Mallikarjun Shankar. Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security [ EB/OL]. (2005-02-22). [2007-11-10]. http://www.iec. ornl. gov/projects/documents/containment. pdf.
  • 10Stephen Lau. The Spinning Cube of Potential Doom[J]. Communications of the ACM., 2004, 47(6) : 25 - 26.

共引文献9

同被引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部