Network Threat Assessment Based on Attribute Recognition

被引:0
作者
Si, Jiaquan [1 ]
Zhang, Qiang [1 ]
Man, Dapeng [1 ]
Wang, Kaizhuo [1 ]
Yang, Wu [1 ]
机构
[1] Harbin Engn Univ, Informat Secur Res Ctr, Heilongjiang, Peoples R China
来源
11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER! | 2009年
关键词
Network threat assessment; attributes recognition; entropy value;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Network threat assessment is an important branch of information security assessment. Its research involves data fusion and data mining. This paper provided an overview of related research efforts in the area of network threat assessment. It presented a network threat assessment framework, and demonstrated a computational approach based on attribute recognition theory. In the computational example, entropy value method is used to determine the index weight. The example's result indicates that attribute recognition theory is simple, practical and able to evaluate network threats effectively.
引用
收藏
页码:1482 / 1486
页数:5
相关论文
共 11 条
[1]   Intrusion detection systems and multisensor data fusion [J].
Bass, T .
COMMUNICATIONS OF THE ACM, 2000, 43 (04) :99-105
[2]  
Cheng Q.S., 1997, SYSTEMS ENG THEORY P, V33, P12
[3]   Responses of broilers to dietary protein levels and amino acid supplementation to low protein diets at various environmental temperatures [J].
Cheng, TK ;
Hamre, ML ;
Coon, CN .
JOURNAL OF APPLIED POULTRY RESEARCH, 1997, 6 (01) :18-33
[4]  
D'Ambrosio B, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, P387, DOI 10.1109/DISCEX.2001.932233
[5]  
Graham JH, 2005, IEEE SYS MAN CYBERN, P1297
[6]  
Hinman ML, 2002, PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOL I, P687, DOI 10.1109/ICIF.2002.1021221
[7]  
JARED H, 2006, MULTISENSOR MULTISOU
[8]  
JAY YS, 2006, MIL COMM C 2006 WASH
[9]  
JIBAO L, 2006, 2006 INT C COMP INT, P1545
[10]  
Llinas J., 2004, Proceedings of the 7th International Conference on Information Fusion, P1218