Network security situation: From awareness to awareness-control

被引:20
作者
Liu, Xiaowu [1 ]
Yu, Jiguo [1 ,2 ,3 ]
Lv, Weifeng [4 ]
Yu, Dongxiao [5 ]
Wang, Yinglong [2 ,3 ]
Wu, Yu [6 ]
机构
[1] Qufu Normal Univ, Sch Informat Sci & Engn, Rizhao 276826, Shandong, Peoples R China
[2] Qilu Univ Technol, Shandong Acad Sci, Sch Comp Sci & Technol, Jinan 250253, Shandong, Peoples R China
[3] Natl Supercomp Ctr Jinan, Shandong Comp Sci Ctr, Shandong 250014, Shandong, Peoples R China
[4] Beihang Univ, Sch Comp Sci & Engn, Beijing 100083, Peoples R China
[5] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266237, Shandong, Peoples R China
[6] Dongguan Univ Technol, Sch Comp Sci & Network Secur, Dongguan 523808, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Network security situation awareness; Cognitive computing; Multi-source fusion; Threat gene; Reinforced learning; Cognitive control; PARTICLE SWARM OPTIMIZATION; COMBINATION; MANAGEMENT;
D O I
10.1016/j.jnca.2019.04.022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network Security Situation Awareness (NSSA) is a security theory which can perceive the network threat from a global perspective. In this paper, we present a Cognitive Awareness-Control Model (CACM) for NSSA. CACM adopts the cross-layer architecture and cognitive circle which can break through the interactive barrier between different network layers. Firstly, we propose a decision-level fusion method in which different weights are assigned for different data sources so that the fusion accuracy can be improved. Secondly, a hierarchical quantification approach is discussed which can avoid inferring the complex memberships among network components. Finally, a cognitive regulation mechanism is analysed in order to solve the issue of automatic control. The simulation experiments show that our model can perceive and regulate the threat situation effectively. To the best of our knowledge, this is the first discussion which utilizes cognitive awareness-control to solve the regulation problem of NSSA.
引用
收藏
页码:15 / 30
页数:16
相关论文
共 58 条
  • [1] A Q Learning and Fuzzy Q Learning Approach for Optimization of Interference Constellations in Femto-Macro Cellular Architecture in Downlink
    Akhtar, Muhammad Waseem
    Ghaffar, Rizwan
    Rashid, Imran
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 88 (04) : 797 - 817
  • [2] Attributed multi-objective comprehensive learning particle swarm optimization for optimal security of networks
    Ali, Hamid
    Khan, Farrukh Aslam
    [J]. APPLIED SOFT COMPUTING, 2013, 13 (09) : 3903 - 3921
  • [3] Angelini M., 2017, J VIS, V20, P1
  • [4] Relating Wiener's cybernetics aspects and a situation awareness model implementation for information security risk management
    Anjaria, Kushal
    Mishra, Arun
    [J]. KYBERNETES, 2018, 47 (01) : 58 - 79
  • [5] Azimirad Ehsan, 2015, Journal of Theoretical and Applied Information Technology, V71, P33
  • [6] Bass T., 1999, Proceedings of the IRIS National Symposium on Sensor and Data Fusion, P24
  • [7] Asymptotic tracking by a reinforcement learning-based adaptive critic controller
    Bhasin S.
    Sharma N.
    Patre P.
    Dixon W.
    [J]. Journal of Control Theory and Applications, 2011, 9 (3): : 400 - 409
  • [8] Deployment optimization for 3D industrial wireless sensor networks based on particle swarm optimizers with distributed parallelism
    Cao, Bin
    Zhao, Jianwei
    Lv, Zhihan
    Liu, Xin
    Kang, Xinyuan
    Yang, Shan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 103 : 225 - 238
  • [9] Belief functions combination without the assumption of independence of the information sources
    Cattaneo, Marco E. G. V.
    [J]. INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2011, 52 (03) : 299 - 315
  • [10] Chen J., 2002, MULTISENSOR ADM INFO, P49