A CORRELATION ANALYSIS METHOD OF NETWORK SECURITY EVENTS BASED ON ROUGH SET THEORY

被引:0
|
作者
Liu, Jing [1 ]
Gu, Lize [1 ]
Xu, Guosheng [1 ]
Niu, Xinxin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Beijing 100876, Peoples R China
关键词
Network security event; Correlation analysis; Rough set; Sequence pattern;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network security event correlation can find real threat through correlating security events and logs generated by different security devices and can be aware of the network security situation accurately. This paper propose a network security events correlation scheme based on rough set, build database of network security events and knowledge base, gives rule generation method and rule matcher. This method solves the simplification and correlation of massive security events through combining data discretization, attribute reduction, value reduction and rule generation.
引用
收藏
页码:517 / 520
页数:4
相关论文
共 50 条
  • [1] Network Security Evaluation Research Based on Rough Set Theory
    Wang, Xuren
    He, Famei
    Wang, Yanli
    Yuan, Xiaohong
    [J]. 2011 AASRI CONFERENCE ON APPLIED INFORMATION TECHNOLOGY (AASRI-AIT 2011), VOL 1, 2011, : 302 - 304
  • [2] Study on Assessment Method for Computer Network Security Based on Rough set
    Kong, Lisha
    Ren, Xiaofei
    Fan, Yongjian
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 617 - +
  • [3] Method on network information system security assessment based on rough set
    Wang Qiangmin
    Lin Mengquan
    Li Jianhua
    [J]. SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 1041 - +
  • [4] Method of scores analysis based on Rough Set Theory
    Tang, Q
    Li, XP
    Liu, J
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2005, : 259 - 261
  • [5] Rough set based solutions for network security
    Wang, GY
    Chen, L
    Wu, Y
    [J]. MONITORING, SECURITY, AND RESCUE TECHNIQUES IN MULTIAGENT SYSTEMS, 2005, : 455 - 465
  • [6] Rough Set Theory based Hybrid Method for Network Intrusion Detection
    Jiao, Na
    [J]. MECHATRONICS, ROBOTICS AND AUTOMATION, PTS 1-3, 2013, 373-375 : 815 - 818
  • [7] A method of constructing fuzzy neural network based on rough set theory
    Huang, XM
    Yi, JK
    Zhang, YH
    [J]. 2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 1723 - 1728
  • [8] Network Teaching Resource Evaluation Method Based on Rough Set Theory
    Fang Gang
    [J]. ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 188 - 192
  • [9] An Analysis Method of Landing Safety Based on Rough Set Theory
    Dai, Ying
    Tian, Jin
    [J]. 2012 PROCEEDINGS - ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM (RAMS), 2012,
  • [10] Research on security evaluation system of network information system based on rough set theory
    Chen, Jia
    Miao, Yingkai
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2021, 14 (03) : 155 - 161