期刊文献+

基于SimHash算法的大数据网络安全态势的评估 被引量:3

Evaluation of big data network security situation based on simhash algorithm
下载PDF
导出
摘要 在网络数据量日益增大及维度逐渐升高的背景下,为了更好地解决传统网络安全态势评估模型存储量小、执行率低的问题,构建了基于SimHash算法的安全态势评估模型。首先对大规模的网络进行划分,得到多个网络模块;然后预处理安全要素数据,将处理结果存储在大数据平台中;最后利用SimHash算法进行节点安全态势评估,基于节点与模块权重获取模块和网络的实际安全态势数据信息。实验结果表明,算法可准确、实时评估网络安全态势,为大数据领域的网络安全态势评估提供了一种新的方法。 Under the background of the increasing amount and dimension of network data,increasing amount of data generated by network security equipment and gradually increasing dimension,in order to realize effective response to the problems of small storage and low execution rate of traditional network security situation assessment model,based on the pre-processing of node security situation elements,this paper proposes a big data network security situation assessment model based on simhash algorithm.In the application process,firstly,the large-scale network is divided into several network modules,and then the security element data is preprocessed.After the preprocessing,the data is stored in the big data platform,and SIM is used.Hash algorithm is used to evaluate the security situation of nodes.Based on the weight of joint nodes and modules,the security situation of modules and networks is obtained.The results show that the algorithm can accurately evaluate the network security situation,and provides a new method for big data network security situation assessment.
作者 童伟传 Tong Weichuan(Data Resource Center of Chun'an County, Zhejiang Chun'an,311700,China)
出处 《机械设计与制造工程》 2022年第5期125-129,共5页 Machine Design and Manufacturing Engineering
关键词 SimHash算法 大数据 网络安全 simhash algorithm big data network security
  • 相关文献

参考文献13

二级参考文献94

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 3高凯,王永成,肖君.网页去重策略[J].上海交通大学学报,2006,40(5):775-777. 被引量:13
  • 4郭双宙,梁金兰.构件库用户反馈子系统的客观反馈的设计[J].计算机技术与发展,2007,17(5):129-132. 被引量:2
  • 5Lakkaraju K, Yurcik W, Lee A J. NVisionIP: NetFlow visualizations of system state for security situational awareness [C] //Proc of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York: ACM, 2004:65-72
  • 6Yin Xiaoxin, Yurcik W, Treaster M, et al. VisFlowConnect: NetFlow visualizations of link relationships for security situational awareness [C] //Proc of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York: ACM, 2004:26-34
  • 7朱亮,王慧强,郑丽君.网络安全态势可视化研究评述[OL].[2008-01-08].http://www.paper.edu.cn/downloadpaper.php?serial_number=200607-36
  • 8Bass T. Intrusion detection systems & multisensor data fusion: Creating Cyberspace Situational Awareness [J].Communications of the ACM, 2000, 43(4): 99-105
  • 9D'Ambrosio B. Security situation assessment and response evaluation (SSARE) [C]//DISCEX'01. Proceedings: DARPA Information Survivability Conference & Exposition Ⅱ. Los Alamitos: IEEE Computer Society, 2001:387-394
  • 10Gorodetsky V, Karsaev O, Samoilov V. On-line update of situation assessment based on asynchronous data streams [C]//Knowledge Based Intelligent Information and Engineering Systems. Berlin/Heidelberg: Springer, 2004 : 1136-1142

共引文献529

同被引文献35

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部