RETRACTED ARTICLE: Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction

被引:0
作者
Pu Zaiyi
机构
[1] China West Normal University,Network and Information Management Center
来源
The Journal of Supercomputing | 2020年 / 76卷
关键词
Network intrusion; Bayes; Network security; Reconstruction of phase space; Dynamic Bayesian network; Comprehensive assessment;
D O I
暂无
中图分类号
学科分类号
摘要
When establishing a network attack strategy, target network information is not certain, and the attacker lacks comprehensive, reliable and real-time attack information, making it difficult to perform an attack. To address this issue, a complex scientific network attack method is proposed. The attacker’s income, losses, costs and encountered risks related to a cyberattack are analysed, an index system is established, and a dynamic Bayesian network is used to comprehensively assess the attack effects on network nodes to overcome drawbacks of the traditional node importance assessment method, which relies on a single network topological index or makes static assessments of the target node. A simulation experiment shows that the proposed method synthesizes more node information and observed data for the attack, thereby avoiding the discrepancy between actual attack effects and theoretical expectations of attacks from static assessment and delivering higher levels of attack accuracy and efficiency than previous methods.
引用
收藏
页码:1342 / 1357
页数:15
相关论文
共 71 条
  • [1] Akoglu L(2015)Graph based anomaly detection and description: a survey Data Min Knowl Disc 29 626-688
  • [2] Tong H(2014)Robust full Bayesian learning for radial basis networks Neural Comput 13 2359-2407
  • [3] Koutra D(2014)Evolution of social networks Eur J Oper Res 234 583-596
  • [4] Andrieu C(2015)Decoding the regulatory network for blood development from single-cell gene expression measurements Nat Biotechnol 33 269-268
  • [5] De FN(2015)Predicting stock and stock price index movement using trend deterministic data preparation and machine learning techniques Expert Syst Appl 42 259-2535
  • [6] Doucet A(2015)Time-series classification with COTE: the collective of transformation-based ensembles IEEE Trans Knowl Data Eng 27 2522-36
  • [7] Hellmann T(2014)A survey on predicting the popularity of web content J Internet Serv Appl 5 8-e117
  • [8] Staudigl M(2014)Suppressing unwanted memories reduces their unconscious influence via targeted cortical inhibition Proc Natl Acad Sci USA 111 E1310-633
  • [9] Moignard V(2016)Analysis of Bayesian classification-based approaches for Android malware detection Inf Secur IET 8 25-444
  • [10] Woodhouse S(2016)TSCAN: pseudo-time reconstruction and evaluation in single-cell RNA-seq analysis Nucleic Acids Res 44 e117-340