期刊文献+

以动态关联分析为基础的计算机网络安全风险评估 被引量:1

下载PDF
导出
摘要 在计算机网络运营中,存在着一些风险隐患,如病毒、木马和黑客等,对于信息传输安全形成了巨大威胁,需要做好计算机网络安全风险的评估和预防工作。本文以动态关联分析为基础,就计算机网络安全风险评估进行了研究和讨论。
作者 屈博
出处 《电子技术与软件工程》 2018年第1期219-219,共1页 ELECTRONIC TECHNOLOGY & SOFTWARE ENGINEERING
  • 相关文献

参考文献2

二级参考文献21

  • 1陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 2Cuppens F and Miege A. Alert correlation in a cooperative intrusion detection framework[C]. Proceedings 2002 IEEE Symposium on Security and Privacy. Oakland, 2002: 202- 215.
  • 3Qin X Z and Lee W K. Statistical causality analysis of INFOSEC alert data[C]. Recent Advances in Intrusion Detection 6th International Symposium, Pittsburgh, 2003, Vol. 2820: 73-93.
  • 4Gorodetsky V, Karsaev 0, and Samoilov V. On-line update of situation assessment based on asynchronous data streams[C]. Knowdedge-Based Intelligent Information and Engineering Systems, Wellington, 2004, Vol. 3213: 1136- 1142.
  • 5Yegneswaran V, Barford P, and Paxson V. Using Honeynets for Internet situational awareness[CIOL]. Proceedings of the Fourth Workshop on Hot Topics in Networks, Berlin, 2005. http://www.icir .otg] vein] papers 1 sit-aware- hotnet05. pdf.
  • 6Hariri S, Qu G Z, Dharrnagadda T, et al. Impact analysis of faults and attacks in large-scale networks[J]. IEEE Security & Privacy, 2003, 1(5): 49-54.
  • 7Mohammad Salim Ahmed, Ehab Al-Shaer , Mohamed Taibah, et al. Objective risk evaluation for automated security management[J]. Journal of Network and Systems Management, 2011, 19(3): 343-366.
  • 8Du Su-guo, Li Xiao-long, Du Jun-bo, et al . An attack?and-defence game for security assessment in vehicular Ad hoc networks[J]. Peer-to-Peer Networking and Applications, 2012, DOl: 1O.1007/s12083-012-0127-9.
  • 9ELSHOUSH H T,SWMAN I M. Alert correlation in collaborative intelligent intrusion detection systems-a suvey[J]. Applied Soft Computing,201 1,1 1(7) : 4349-4365.
  • 10DU S, LI X, DU J, et al. An attack-and-defense game for security assessment in vehicular ad hoc networks[J]. Peer-to Peer Networ- king and Applications,2014,7(3) : 215-228.

共引文献24

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部