期刊文献+

基于APT逻辑的恐怖事件因果关系分析 被引量:1

APT Logic-based Causality Analysis of Terrorist Incidents
下载PDF
导出
摘要 近年来,世界范围内恐怖事件频发,严重威胁国际社会安全,恐怖事件分析已成为内容安全领域的研究热点。APT逻辑是指通过建立规则,对时序事件因果关系建立推理模型,在多个领域得到了广泛应用。在前人工作的基础上,文章提出了一种灵活性和可扩展性较好的基于APT逻辑的恐怖事件因果关系分析算法,并使用全球恐怖主义数据库中的数据对极端组织"伊斯兰国"发动的恐怖事件的因果关系进行研究,且对结果进行了测试。文章得到了部分恐怖事件的因果关系对,对研究恐怖事件提供了帮助。 In recent years, terrorist incidents have occurred frequently in the world, which seriously threatens the safety of the international community. The analysis of terrorist incidents has become a hot topic in the field of content security. APT logic proposes a reasoning model for causal relationships of temporal events by establishing rules, which has been widely used in many fields. On the basis of previous works, this paper propose a flexible and extensible causality analysis algorithm of terrorist incidents based on APT logic, and uses the data from the Global Terrorism Database to investigate the causal relationships between terrorist attacks conducted by the ISIS. The paper tests the results and gets some causal relationships between some of the terrorist attacks, which provide help for the study of terrorist incidents.
出处 《信息网络安全》 CSCD 2017年第9期93-97,共5页 Netinfo Security
基金 国家重点研发计划[2016QY03D0503] 中科院战略合作专项[AQ-1708 AQ-1703] 国家自然科学基金[U163620068]
关键词 因果关系分析 APT逻辑 事件分析 伊斯兰国 恐怖事件 causality analysis APT logic event analysis ISIS terrorist incident
  • 相关文献

参考文献3

二级参考文献12

  • 1彭雪娜,赵宏.一个融合网络安全信息的安全事件分析与预测模型[J].东北大学学报(自然科学版),2005,26(3):228-231. 被引量:11
  • 2马壮,杨善林,胡小建.贝叶斯网结构学习的研究现状及发展趋势[J].合肥工业大学学报(自然科学版),2005,28(8):833-838. 被引量:7
  • 3Stuart J. Russell, Peter Norvig. Artificial Intelligence: A Modern Approach (Second edition) [C]. Pearson Education, Prentice Hall, 1995.
  • 4Sandeep Kumar, Eugene Spafford. An application of pattern matching in intrusion detection[C]. CSD-TP,-94-013, Department of Computer Science, Purdue University, 1994.66-75.
  • 5The UCI KDD Archive. KDD Cup 1999 Data[EB/OL]. http://kdd. ics.uci.edu/ databases/kddcup99 / k ddcup99.html, 2012-07-12.
  • 6PNL[EB/OL]. http://sourceforge.net/projects/openpnl/, 2012-07-12.
  • 7Harles Elkan. Results of the KDD'99 Classifier Learning Contest[EB/ OL]. http://www-cse.ucsd.edu/users/elkan/clresults.html, 2012-07-12.
  • 8Maheshkumar Sabhnani, Gursel Serpen. Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context[C]. Proceedings of International Cont~erence on Machine Learning: Models, Technologies, and Applications (MLMTA 2003), 2003. 209-215.
  • 9诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 10闵京华,王连强.信息安全事件分类分级的研究过程及国际标准提案进展[J].信息技术与标准化,2009(3):23-26. 被引量:4

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部