Network Security Situation Quantitative Awareness Based on Fusion

  

  • Received:2012-09-13 Revised:2012-12-21 Published:2013-06-20
  • Contact: Liu XiaoWu

Abstract: In order to solve the problems of multi-source fusion and quantitative awareness in the study of network security situation awareness, we introduced the particle swarm optimization which could search the exponent weight for different reliability data source into the D-S evidence fusion and the multi-source fusion was obtained. Based on the fusion, we studied the threaten gene acquisition method with adaptability through the discretization to normal distribution and the situation factor extraction was accomplished. According to the fusion and factor extraction, a formal network security situation awareness method was proposed which could generate service, host and network system level situation evolution curves. The simulation experiments show that the presented fusion method can increases the detection rate and decreases the false detection rate. The formal quantitative method is able to aware the dynamic changing of the threat and meets the goal that monitors the network in an effective manner.

Key words: computer application, network security situation awareness, multi-source fusion, quantitative awareness

CLC Number: 

  • TP393
[1] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[2] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[3] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[4] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[5] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
[6] YANG Dong-sheng, ZHANG Zhan, LIAN Meng-jia, WANG Li-na. Matching binary feature search algorithm of bitmap locality sensitive hashing [J]. 吉林大学学报(工学版), 2018, 48(3): 893-902.
[7] DENG Jian-xun, XIONG Zhong-yang, DENG Xin. Improved DNALA algorithm based on spectral clustering matrix [J]. 吉林大学学报(工学版), 2018, 48(3): 903-908.
[8] LIN Jin-hua, WANG Yan-jie, WANG Lu, YAO Yu. Real-time surface reconstruction based global camera pose optimization [J]. 吉林大学学报(工学版), 2018, 48(3): 909-918.
[9] ZHAO Hong-wei, LIU Yu-qi, TE Ri-gen, CHEN Chang-zheng, ZANG Xue-bai. New compression algorithms based on finite sequence [J]. 吉林大学学报(工学版), 2018, 48(3): 882-886.
[10] ZHANG Wei-wei, HE Jia-feng, GAO Guo-wang, REN Li-li, SHEN Xuan-jing. Wireless Mesh network routing and channel allocation union optimization algorithm based on game theory [J]. 吉林大学学报(工学版), 2018, 48(3): 887-892.
[11] DI Xiao-qiang, WANG Ying-zheng, LI Jin-qing, CONG Li-gang, QI Hui. Video encryption method based on hyperchaos of quantum cellular neural networks [J]. 吉林大学学报(工学版), 2018, 48(3): 919-928.
[12] GENG Qing-tian, YU Fan-hua, WANG Yu-ting, GAO Qi-kun. New algorithm for vehicle type detection based on feature fusion [J]. 吉林大学学报(工学版), 2018, 48(3): 929-935.
[13] CAI Zhen-nao, LYU Xin-en, CHEN Hui-ling. Prediction model of somatization disorder based on an oppositional bacterial foraging optimization based support vector machine [J]. 吉林大学学报(工学版), 2018, 48(3): 936-942.
[14] HAN Jia-wei, LIU Yan-heng, SUN Xin, SONG Li-jun. Identity-based encryption scheme based on cloud and quantum keys [J]. 吉林大学学报(工学版), 2018, 48(2): 551-557.
[15] YANG Hong-yu, XU Jin. An Android malware static detection model [J]. 吉林大学学报(工学版), 2018, 48(2): 564-570.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!