Four common oil analysis techniques, including the ferrography analysis (FA), the spectrometric oil analysis (SOA), the particle count analysis (PCA), and the oil quality testing (OQT), are used to implement t...Four common oil analysis techniques, including the ferrography analysis (FA), the spectrometric oil analysis (SOA), the particle count analysis (PCA), and the oil quality testing (OQT), are used to implement the military aeroengine wear fault diagnosis during the test drive process. To improve the precision and the reliability of the diagnosis, the aeroengine wear fault fusion diagnosis method based on the neural networks (NN) and the Dempster-Shafter (D-S) evidence theory is proposed. Firstly, according to the standard value of the wear limit, original data are pre-processed into Boolean values. Secondly, sub-NNs are established to perform the single diagnosis, and their training samples are dependent on experiences from experts. After each sub-NN is trained, diagnosis results are obtained. Thirdly, the diagnosis results of each sub-NN are considered as the basic probability allocation value to faults. The improved D-S evidence theory is applied to the fusion diagnosis, and the final fusion results are obtained. Finally, the method is verified by a diagnosis example.展开更多
Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectivel...Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectively defend against attacks and attackers. To do this, correlative information provided by IDS must be gathered and the current intrusion characteristics and sit- uation must be analyzed and estimated. This paper applies D-S evidence theory to distributed intrusion detection system for fusing information from detection centers, making clear intrusion situation, and improving the early warning capability and detection efficiency of the IDS accord- ingly.展开更多
How to obtain proper prior distribution is one of the most critical problems in Bayesian analysis. In many practical cases, the prior information often comes from different sources, and the prior distribution form cou...How to obtain proper prior distribution is one of the most critical problems in Bayesian analysis. In many practical cases, the prior information often comes from different sources, and the prior distribution form could be easily known in some certain way while the parameters are hard to determine. In this paper, based on the evidence theory, a new method is presented to fuse the information of multiple sources and determine the parameters of the prior distribution when the form is known. By taking the prior distributions which result from the information of multiple sources and converting them into corresponding mass functions which can be combined by Dempster-Shafer (D-S) method, we get the combined mass function and the representative points of the prior distribution. These points are used to fit with the given distribution form to determine the parameters of the prior distribution. And then the fused prior distribution is obtained and Bayesian analysis can be performed. How to convert the prior distributions into mass functions properly and get the representative points of the fused prior distribution is the central question we address in this paper. The simulation example shows that the proposed method is effective.展开更多
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se...Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.展开更多
文摘Four common oil analysis techniques, including the ferrography analysis (FA), the spectrometric oil analysis (SOA), the particle count analysis (PCA), and the oil quality testing (OQT), are used to implement the military aeroengine wear fault diagnosis during the test drive process. To improve the precision and the reliability of the diagnosis, the aeroengine wear fault fusion diagnosis method based on the neural networks (NN) and the Dempster-Shafter (D-S) evidence theory is proposed. Firstly, according to the standard value of the wear limit, original data are pre-processed into Boolean values. Secondly, sub-NNs are established to perform the single diagnosis, and their training samples are dependent on experiences from experts. After each sub-NN is trained, diagnosis results are obtained. Thirdly, the diagnosis results of each sub-NN are considered as the basic probability allocation value to faults. The improved D-S evidence theory is applied to the fusion diagnosis, and the final fusion results are obtained. Finally, the method is verified by a diagnosis example.
文摘Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectively defend against attacks and attackers. To do this, correlative information provided by IDS must be gathered and the current intrusion characteristics and sit- uation must be analyzed and estimated. This paper applies D-S evidence theory to distributed intrusion detection system for fusing information from detection centers, making clear intrusion situation, and improving the early warning capability and detection efficiency of the IDS accord- ingly.
文摘How to obtain proper prior distribution is one of the most critical problems in Bayesian analysis. In many practical cases, the prior information often comes from different sources, and the prior distribution form could be easily known in some certain way while the parameters are hard to determine. In this paper, based on the evidence theory, a new method is presented to fuse the information of multiple sources and determine the parameters of the prior distribution when the form is known. By taking the prior distributions which result from the information of multiple sources and converting them into corresponding mass functions which can be combined by Dempster-Shafer (D-S) method, we get the combined mass function and the representative points of the prior distribution. These points are used to fit with the given distribution form to determine the parameters of the prior distribution. And then the fused prior distribution is obtained and Bayesian analysis can be performed. How to convert the prior distributions into mass functions properly and get the representative points of the fused prior distribution is the central question we address in this paper. The simulation example shows that the proposed method is effective.
基金supported by the National Natural Science Foundation of China under Grant No.60903166 the National High Technology Research and Development Program of China(863 Program) under Grants No.2012AA012506,No.2012AA012901,No.2012AA012903+9 种基金 Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20121103120032 the Humanity and Social Science Youth Foundation of Ministry of Education of China under Grant No.13YJCZH065 the Opening Project of Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) under Grant No.C13613 the China Postdoctoral Science Foundation General Program of Science and Technology Development Project of Beijing Municipal Education Commission of China under Grant No.km201410005012 the Research on Education and Teaching of Beijing University of Technology under Grant No.ER2013C24 the Beijing Municipal Natural Science Foundation Sponsored by Hunan Postdoctoral Scientific Program Open Research Fund of Beijing Key Laboratory of Trusted Computing Funds for the Central Universities, Contract No.2012JBM030
文摘Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.