The Information System Security Situational Awareness Based On Cloud Computing

被引:0
作者
Ma Zhicheng [1 ]
Jin Lin [2 ]
Yang Peng [2 ]
机构
[1] State Grid Gansu Elect Power Co, Informat & Telecomm Co, Lanzhou, Peoples R China
[2] North China Elect Power Univ, New Energy Power Syst State Key Lab, Beijing, Peoples R China
来源
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS) | 2014年 / 109卷
关键词
Cloud Computing; Apriori Algorithm; Security Situational Awareness; Data Dining; Knowledge Discovery;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing amount of data in the information network, various network threats are growing. Designing efficient and reliable security situational awareness methods becomes one of the main tasks of information security. By using the Apriori algorithm based on MapReduce in the cloud computing environment to knowledge discovery in the network security situational awareness, we can realize rapid security modeling and security situational generation of huge amounts of data. Firstly, the system uses D-S evidence theory to model security situation, streaming, filtering and integrating various types of security events. Secondly, we introduce MP-Apriori algorithm to knowledge discovery, from which association rules of security alarm events generate. Lastly, network security situation generates based on security situation generation algorithm. Then, we use KDD Cup 99 data sets to simulate experiment. We input equal amount of security warning events, verify the accuracy of the CC-SSA and compare the time of using four different computing nodes. The experiment shows that CC-SSA method for a network security situational awareness of huge amounts of data is superior in speed.
引用
收藏
页码:583 / 586
页数:4
相关论文
共 10 条
[1]  
[Anonymous], 1999, KDD CUP 99 TASK DESC
[2]   Quantitative hierarchical threat evaluation model for network security [J].
State Key Laboratory of Manufacturing System, Center for Networked Systems and Information Security, Xi'an Jiaotong University, Xi'an 710049, China ;
不详 .
Ruan Jian Xue Bao, 2006, 4 (885-897) :885-897
[3]  
Han JW, 2000, SIGMOD RECORD, V29, P1
[4]  
Hu W, 2006, WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, P4747
[5]  
Huiqiang Wang, 2007, 2007 Second International Multisymposium on Computer and Computational Sciences - IMSCCS '07, P352
[6]  
Lai JB, 2006, 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, P1545
[7]  
Liu Mixia, 2008, 2008 Workshop on Knowledge Discovery and Data Mining (WKDD '08), P542, DOI 10.1109/WKDD.2008.35
[8]  
Mika K., 1999, KNOWLEDGE DISCOVERY
[9]  
Siraj Ambareen., 2006, A Unified Alert Fusion Model for Intelligent Analysis of Sensor Data in an Intrusion Detection Environment
[10]  
Yong Z, 2007, CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, P768