[1]张淑雯,刘效武,孙雪岩. 基于多源融合的网络安全态势层次感知[J].计算机技术与发展,2016,26(10):77-82.
 ZHANG Shu-wen,LIU Xiao-wu,SUN Xue-yan. Hierarchical Awareness of Network Security Situation Based on Multi-source Fusion [J].,2016,26(10):77-82.
点击复制

 基于多源融合的网络安全态势层次感知()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年10期
页码:
77-82
栏目:
安全与防范
出版日期:
2016-10-10

文章信息/Info

Title:
 Hierarchical Awareness of Network Security Situation Based on Multi-source Fusion

文章编号:
1673-629X(2016)10-0077-06
作者:
 张淑雯刘效武孙雪岩
 曲阜师范大学 信息科学与工程学院
Author(s):
 ZHANG Shu-wenLIU Xiao-wuSUN Xue-yan
关键词:
 网络安全态势感知数据融合蚁群算法神经网络特征选择
Keywords:
 network  security  situation awarenessdata fusioant  colony  optimizationneural networkfeature selection
分类号:
TP393
文献标志码:
A
摘要:
 网络安全态势感知是近年来的一种新型安全技术,因其可以解决传统安全技术难以解决的数据源单一、虚警率高等问题,提升对全局安全状况的动态理解能力而备受关注。针对现有的研究,提出一种基于多源融合的网络安全态势层次感知模型,利用蚁群D-S证据组合规则处理多源融合问题,从而减少态势参数赋予主观性强的问题。同时,利用神经网络搜索安全事件的关键特征,降低数据维数,避免维数爆炸,提高实时性。最后采用层次化感知算法,将离散报警映射为动态威胁趋势,提升对网络安全的定量分析能力。仿真结果表明,提出的算法能够提高检测率,降低误警率,可以动态监控网络安全威胁的演化状态。
Abstract:
 In recent year,network security situation awareness is an emerging security technology and garners widespread attentions be-cause it can solve the issues that the traditional security technology difficult to deal with,such as a single data source and the high false a-larm rate,and enhance the dynamic understanding abilities for the overall security situation. For the current research,a network security situation awareness model is proposed based on multi-source fusion which utilizes ant colony D-S evidence combination rule to deal with the multi-source data fusion problem with aim of reducing the subjective dependence of situation parameters. Meanwhile,the neural net-work is applied for searching key characteristics of security events to reduce data dimension,avoid dimension explosion and improve the real-time performance. It also discusses a hierarchical awareness algorithm and can map the discrete alarms to the dynamic threats tenden-cy in order to improve the capacity of quantitative analysis for network security. The simulation shows that the proposed model and algo-rithm can improve the detection rate and decrease false alarm rate,and dynamically monitor the evolution of the network security threats.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(10):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(10):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(10):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(10):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(10):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(10):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(10):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(10):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(10):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(10):47.

更新日期/Last Update: 2016-11-25