期刊文献+

融合多源告警信息的安全态势感知方法 被引量:2

Research On Security Situation Awareness Method Based On Multi-Source Warning Information Fusion
下载PDF
导出
摘要 为了解决海量网络告警信息无法有效整合的问题,提出一种融合多源告警信息的安全态势感知方法,该方法通过深度学习利用告警信息的关联性对多源告警信息进行分析、融合关联,在此基础上,采用最大概率攻击路径的方法更清晰展现网络攻击行为,从而提升网络安全态势感知的精准度。 To solve the problem that massive network alarm information cannot be effectively integrated, this paper proposes a security situation awareness method that integrates multi-source warming information. Through deep learning methods, the relevance of warning information is used to analyze, fuse and associate the multi-source warning information. On this basis, the method of maximum probability attack path is used to show network attack behavior more clearly, so as to improve the accuracy of network security situation awareness.
作者 石镇宇 SHI Zhenyu(China Mobile Tietong Shanxi Branch,Xi'an 710061,China)
出处 《移动通信》 2022年第12期108-113,共6页 Mobile Communications
关键词 深度学习 告警信息 融合关联 网络安全态势感知 deep learning warning information fusion and association network security situation awareness
  • 相关文献

参考文献2

二级参考文献23

  • 1诸葛建伟,王大为,陈昱,叶志远,邹维.基于D-S证据理论的网络异常检测方法[J].软件学报,2006,17(3):463-471. 被引量:56
  • 2陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 3Pfleeger S L, et al, Insiders behaving badly: Addressing bad actors and their actions. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 169-179.
  • 4Afghan war diary, 2004-2010 [EB/OLJ. http://wikileaks. org/wiki/ Afghan_ WacDiary_2004-2010. 2010-07.
  • 5Schonlau M, Dumouchel W, Iu W, et al. Computer intrusion: Detecting masquerades. Statistical Science, 2001: 58-74.
  • 6Salem M, Stolfo S. Modeling user search behavior for masquerade detectionllProceeding of the 14th International Symposium Recent Advances in Intrusion Detection. Berlin Heidelberg: Springer, 2011: 181-200.
  • 7Zheng N, Palo ski A, Wang H, An efficient user verification system via mouse movementsllProceedings of the 18th ACM Conference On Computer and communications. Chicago, Illinois, USA, 2011: 139-150.
  • 8Brackney R C, Anderson R H. Understanding the Insider Threat: Proceedings of a March 2004 Workshop. Santa Monica, CA: RAND Corporation, 2004. http://www. rand. org/ pubs/conLproceedings/CF196.
  • 9Maloof M, Stephens G. Elicit: A system for detecting insiders who violate need-to-knowIIProceeding of the 14th International Symposium Recent Advances in Intrusion Detection. Berlin Heidelberg: Springer, 2007: 146-166.
  • 10Poolsappasit N, Dewri R, Ray 1. Dynamic security risk management using Bayesian attack graphs. IEEE Transactions on Dependable and Secure Computing, 2012, 9(1): 61-74.

共引文献106

同被引文献23

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部