Network security situation: From awareness to awareness-control

被引:20
作者
Liu, Xiaowu [1 ]
Yu, Jiguo [1 ,2 ,3 ]
Lv, Weifeng [4 ]
Yu, Dongxiao [5 ]
Wang, Yinglong [2 ,3 ]
Wu, Yu [6 ]
机构
[1] Qufu Normal Univ, Sch Informat Sci & Engn, Rizhao 276826, Shandong, Peoples R China
[2] Qilu Univ Technol, Shandong Acad Sci, Sch Comp Sci & Technol, Jinan 250253, Shandong, Peoples R China
[3] Natl Supercomp Ctr Jinan, Shandong Comp Sci Ctr, Shandong 250014, Shandong, Peoples R China
[4] Beihang Univ, Sch Comp Sci & Engn, Beijing 100083, Peoples R China
[5] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266237, Shandong, Peoples R China
[6] Dongguan Univ Technol, Sch Comp Sci & Network Secur, Dongguan 523808, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Network security situation awareness; Cognitive computing; Multi-source fusion; Threat gene; Reinforced learning; Cognitive control; PARTICLE SWARM OPTIMIZATION; COMBINATION; MANAGEMENT;
D O I
10.1016/j.jnca.2019.04.022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network Security Situation Awareness (NSSA) is a security theory which can perceive the network threat from a global perspective. In this paper, we present a Cognitive Awareness-Control Model (CACM) for NSSA. CACM adopts the cross-layer architecture and cognitive circle which can break through the interactive barrier between different network layers. Firstly, we propose a decision-level fusion method in which different weights are assigned for different data sources so that the fusion accuracy can be improved. Secondly, a hierarchical quantification approach is discussed which can avoid inferring the complex memberships among network components. Finally, a cognitive regulation mechanism is analysed in order to solve the issue of automatic control. The simulation experiments show that our model can perceive and regulate the threat situation effectively. To the best of our knowledge, this is the first discussion which utilizes cognitive awareness-control to solve the regulation problem of NSSA.
引用
收藏
页码:15 / 30
页数:16
相关论文
共 58 条
  • [51] Routing, power control and rate adaptation: A Q-learning-based cross-layer design
    Wang, Ke
    Chai, Teck Yoong
    Wong, Wai-Choong
    [J]. COMPUTER NETWORKS, 2016, 102 : 20 - 37
  • [52] The mechanism of dietary cholesterol effects on lipids metabolism in rats
    Wang, Yu-Ming
    Zhang, Bei
    Xue, Yong
    Li, Zhao-Jie
    Wang, Jing-Feng
    Xue, Chang-Hu
    Yanagita, Teruyoshi
    [J]. LIPIDS IN HEALTH AND DISEASE, 2010, 9
  • [53] Discrete-Time Deterministic Q-Learning: A Novel Convergence Analysis
    Wei, Qinglai
    Lewis, Frank L.
    Sun, Qiuye
    Yan, Pengfei
    Song, Ruizhuo
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2017, 47 (05) : 1224 - 1237
  • [54] [韦勇 Wei Yong], 2009, [计算机研究与发展, Journal of Computer Research and Development], V46, P353
  • [55] Xiaoyan Li, 2016, 2016 2nd International Conference on Information Management (ICIM), P57, DOI 10.1109/INFOMAN.2016.7477534
  • [56] Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things
    Xu, Guangquan
    Cao, Yan
    Ren, Yuanyuan
    Li, Xiaohong
    Feng, Zhiyong
    [J]. IEEE ACCESS, 2017, 5 : 21046 - 21056
  • [57] Assessment of E-Commerce security using AHP and evidential reasoning
    Zhang, Yajuan
    Deng, Xinyang
    Wei, Daijun
    Deng, Yong
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (03) : 3611 - 3623
  • [58] Zhang Yong, 2011, Journal of Software, V22, P495, DOI 10.3724/SP.J.1001.2011.03751