Research on the Construction of Network Security Attack Detection Model Based on Knowledge Graph

被引:0
|
作者
Qin, Lina [1 ]
机构
[1] Wuhan Business University, Modern Education Technology Center, Wuhan,430056, China
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Computer viruses - Data mining - Deep learning - Graph theory - Intrusion detection - Knowledge management - Learning algorithms - Natural language processing systems - Semantics - Zero-day attack
引用
收藏
页码:596 / 603
相关论文
共 50 条
  • [1] Research on Network Security Quantitative Model Based on Probabilistic Attack Graph
    Cui, Yimin
    Li, Junmei
    Zhao, Wei
    Luan, Cheng
    [J]. AMCSE 2018 - INTERNATIONAL CONFERENCE ON APPLIED MATHEMATICS, COMPUTATIONAL SCIENCE AND SYSTEMS ENGINEERING, 2019, 24
  • [2] Network Attack Chain Security Model Construction Based On Attack Framework
    Hu, Jian
    Wang, Hailin
    Li, Hanruo
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (04) : 116 - 127
  • [3] Study of network security evaluation based on attack graph model
    Electronic Engineering Institute, Hefei 230037, China
    不详
    [J]. Tongxin Xuebao, 2007, 3 (29-34):
  • [4] Complex Network Security Analysis based on Attack Graph Model
    Liu, Zhiming
    Li, Sheng
    He, Jin
    Xie, Di
    Deng, Zhantao
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
  • [5] Attack graph based evaluation of network security
    Kotenko, Igor
    Stepashkin, Mikhail
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
  • [6] Research on attack graph generation for network security situation
    Wang, Yanbo
    Wang, Huiqiang
    Zhao, Chao
    Zhang, Yushu
    Yu, Ming
    [J]. Advances in Intelligent Systems and Computing, 2013, 212 : 1147 - 1154
  • [7] Network Security Risk Assessment Method Based on HMM and Attack Graph Model
    Liu Si-chao
    Liu Yuan
    [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
  • [8] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [9] Heuristic Network Security Risk Based on Attack Graph
    Sun, Wei
    Li, Qianmu
    Wang, Pengchuan
    Hou, Jun
    [J]. CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 181 - 194
  • [10] Multi-agent network security risk assessment research based on attack graph
    Xie, Lixia
    Qiu, Xiaorui
    Zhao, Binbin
    [J]. ICIC Express Letters, Part B: Applications, 2015, 6 (10): : 2809 - 2816