Volume 41 Issue 10
Oct.  2015
Turn off MathJax
Article Contents
WEN Zhicheng, Chen Zhigang. Constructing general cube to be aware of network security situation[J]. Journal of Beijing University of Aeronautics and Astronautics, 2015, 41(10): 1966-1974. doi: 10.13700/j.bh.1001-5965.2015.0010(in Chinese)
Citation: WEN Zhicheng, Chen Zhigang. Constructing general cube to be aware of network security situation[J]. Journal of Beijing University of Aeronautics and Astronautics, 2015, 41(10): 1966-1974. doi: 10.13700/j.bh.1001-5965.2015.0010(in Chinese)

Constructing general cube to be aware of network security situation

doi: 10.13700/j.bh.1001-5965.2015.0010
  • Received Date: 05 Jan 2015
  • Rev Recd Date: 10 Apr 2015
  • Publish Date: 20 Oct 2015
  • Concerning the problems of limited current network security situation assessment scope, single information source, higher time and space complexity and larger deviation of the accuracy, a method was put forward to construct general cube, which can be aware of the network security situation. The continuous situation factor data monitored can be pretreated by discretizing by "3σ rule" and aggregated in the general built cube, that fused into component security situation vertically and merged into the network security situation from component security situation using statistical methods horizontally. It can provide reliable reference to enhance network security. Finally, making full use of network data, the network security situation awareness model and algorithm proposed are verified and the experimental results show correctness of this method.

     

  • loading
  • [1]
    Bass T.Multi-sensor data fusion for next generation distributed intrusion detection systems[C]∥Proceedings of the'99 IRIS National Symposium on Sensor and Data Fusion.Piscataway,NJ:IEEE Press,1999:24-27.
    [2]
    Mazur J,Kaderali L.The importance and challenges of bayesian parameter learning in systems biology[J].Model Based Parameter Estimation Contributions in Mathematical and Computational Sciences,2013,4:145-156.
    [3]
    黄同庆,庄毅.一种实时网络安全态势预测方法[J].小型微型计算机系统,2014,35(2):303-306.Huang T Q,Zhuang Y.An approach to real-time network security situation prediction[J].Journal of Chinese Computer Systems,2014,35(2):303-306(in Chinese).
    [4]
    Blasch E P,Plano S.JDL level 5 fusion model "user refinement" issues and applications in group tracking[C]∥Proceedings of the Signal Processing,Sensor Fusion,and Target Recognition XI,Spie.Bellingham,WA:SPIE,2002:270-279.
    [5]
    龚正虎,卓莹.网络态势感知研究[J].软件学报,2010,21(7):1605-1619.Gong Z H,Zhuo Y.Research on cyberspace situational awareness[J].Journal of Software,2010,21(7):1605-1619(in Chinese).
    [6]
    Bradshaw J M,Carvalho M,Bunch L,et al.Sol:An agent-based framework for cyber situation awareness[J].KI-Künstliche Intelligenz,2012,26(1):127-140.
    [7]
    Digioia G,Foglietta C,Oliva G,et al.Aware online interdependency modeling via evidence theory[J].International Journal of Critical Infrastructures,2013,6893:74-92.
    [8]
    Bazan J G,Bazan-Socha S,Buregwa-Czuma S,et al.Classifiers based on data sets and domain knowledge:A rough set approach[J].Intelligent Systems Reference Library,2013,43:93-136.
    [9]
    Sample C,Schaffer K.An overview of anomaly detection[J].IT Professional,2013,15(1):8-11.
    [10]
    王宏,龚正虎.一种基于信息熵的关键流量矩阵发现算法[J].软件学报,2009,20(5):1377-1383.Wang H,Gong Z H.Algorithm based on entropy for finding critical traffic matrices[J].Journal of Software,2009,20(5):1377-1383(in Chinese).
    [11]
    陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897.Chen X Z,Zheng Q H,Guan X H,et al.Quantitative hierarchical threat evaluation model for network security[J].Journal of Software,2006,17(4):885-897(in Chinese).
    [12]
    Görnitz N,Kloft M,Rieck K,et al.Toward supervised anomaly detection[J].Journal of Artificial Intelligence Research,2013,46:235-262.
    [13]
    Erbachera R F,Frinckeb D A,Wongb P C,et al.A multi-phase network situational awareness cognitive task analysis[J].Information Visualization,2010,9(3):204-219.
    [14]
    韦勇,连一峰,冯登国.基于信息融合的网络安全态势评估模型[J].计算机研究与发展,2009,46(3):353-362.Wei Y,Lian Y F,Feng D G.A network security situational awareness model based on information fusion[J].Journal of Computer Research and Development,2009,46(3):353-362(in Chinese).
    [15]
    张勇,谭小彬,崔孝林,等.基于Markov博弈模型的网络安全态势感知方法[J].软件学报,2011,22(3):495-508.Zhang Y,Tan X B,Cui X L,et al.Network security situation awareness approach based on Markov game model[J].Journal of Software,2011,22(3):495-508(in Chinese).
    [16]
    谢丽霞,王亚超,于巾博.基于神经网络的网络安全态势感知[J].清华大学学报:自然科学版,2013,53(12):1750-1760.Xie L X,Wang Y C,Yu J B.Network security situation awareness based on neural networks[J].Journal of Tsinghua University:Science & Technology,2013,53(12):1750-1760(in Chinese).
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(1079) PDF downloads(475) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return