The Technical Research on the Assessment of Network Security Situation Based on D-S Evidence Theory

被引:1
作者
Chen, Jian [1 ]
Yang, Mingyuan [2 ]
Hussain, Rifat [3 ]
机构
[1] WuchanZhongda Digital Technol Co Ltd, Hangzhou 310020, Peoples R China
[2] China Merchants Bank Co Ltd, Credit Card Ctr, Shanghai 200061, Peoples R China
[3] Appl Sci Univ, Coll Adm Sci, Eker, Bahrain
关键词
overall situation assessment; hidden Markov model; PageRank algorithm; D-S evidence theory;
D O I
10.2478/amns.2022.2.0105
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With the increasing importance of network security, more attention is paid to the research on network security situation awareness, while network security situation assessment is the core of situation awareness. The existing situation assessment technology has many problems, such as unitary methodology, large-scale subjective factors and so on, affecting the accuracy of situation assessment. Combined with the traditional network security technology, this paper sets up a three-layer evaluation index system, and puts forward an overall network security situation evaluation model based on hidden Markov model, PageRank algorithm and D-S evidence theory, through which, the overall situation is evaluated after using different fusion algorithms in different fusion stages. The simulation result shows that the above assessment method is more accurate and efficient than the method using single model.
引用
收藏
页码:1177 / 1192
页数:15
相关论文
共 16 条
[1]  
Cao lili., 2015, ON LINE FAULT DIAGNO
[2]  
Cheng X., 2012, COMPUTATIONAL INFORM, P864
[3]   Fast distributed Page Rank computation [J].
Das Sarma, Atish ;
Molla, Anisur Rahaman ;
Pandurangan, Gopal ;
Upfal, Eli .
THEORETICAL COMPUTER SCIENCE, 2015, 561 :113-121
[4]  
Fang Yan, 2013, Application Research of Computers, V30, P2763, DOI 10.3969/j.issn.1001-3695.2013.09.051
[5]  
Gong Jian, 2017, Journal of Software, V28, P1010, DOI 10.13328/j.cnki.jos.005142
[6]  
Greene A., 2015, Machine Learning and Data Mining Approaches to Climate Science SE - 6, P61, DOI DOI 10.1007/978-3-319-17220-0_6
[7]  
Hong Chen., 2015, COMPUTER ENG APPL, V51, P96
[8]  
Hong-sheng, 2009, INTRO STOCHASTIC PRO
[9]   基于改进D-S证据理论的网络安全态势评估方法 [J].
汤永利 ;
李伟杰 ;
于金霞 ;
闫玺玺 .
南京理工大学学报, 2015, 39 (04) :405-411
[10]  
Tu Stephen., 2015, Derivation of baum-welch algorithm for hidden markov models