Information Security Defense Situation Assessment of Network Warfare Based on Dynamic Bayesian Network

被引:0
|
作者
Hui Baofeng [1 ]
Jia Guoqing [1 ]
Chen Shanji [1 ]
机构
[1] Qinghai Univ Nationalities, Xining, Qinghai, Peoples R China
关键词
Bayes; network security; defense; evaluation; intrusion detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of global informatization, increasingly rampant information security event has caused wide attention of people to information security problem. However, current information security technology based on traditional defense technology is hard to deal with it. Therefore, experts of information security start to focus on information security technology research based on active defense thought. At present, research on information security defense technology mainly focuses on active defense for information security relevant to security situation evaluation and security threat prediction. From the perspective of technology, based on Bayes Model, research has been implemented to security situation evaluation method in information security field and attack route prediction method. This paper puts forward a kind of evaluation method for evaluating overall system security and vulnerabilities severity degree, which can effectively evaluate overall system security and vulnerabilities severity degree.; firstly, it puts forward a kind of Cause Result Detection Algorithm (CRDA) to confirm causal relationship; secondly, it provides Bayes Attach Diagram and provide generation algorithm BAGA of BAG according to system structure of attack model; finally, it is proved that the method can effectively solve error calculation problem of node confidence coefficient by experiment to accurately predict transmission route of network threat.
引用
收藏
页码:1385 / 1388
页数:4
相关论文
共 50 条
  • [1] Network Information Security Situation Assessment Based on Bayesian Network
    Wang Xing-zhu
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 129 - 137
  • [2] A Method for Information Security Risk Assessment Based on the Dynamic Bayesian Network
    Wang, Jiao
    Fan, Kefeng
    Mo, Wei
    Xu, Dongyang
    [J]. PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 279 - 283
  • [3] Research on Security Situation Prediction of Equipment Support Information Network Based on Bayesian Network
    Li, Xi
    Lu, Yu
    Liu, Sen
    [J]. PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 869 - 873
  • [4] Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction
    Pu Zaiyi
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (02): : 1342 - 1357
  • [5] Research on the Network Security Situation Assessment Based on the Information Fusion
    Ma, Ting
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 132 - 133
  • [6] Dynamic situation assessment method of aerial warfare based on improved evidence network
    Wang, Yu
    Zhang, Weiguo
    Fu, Li
    Huang, Degang
    Li, Yong
    [J]. Hangkong Xuebao/Acta Aeronautica et Astronautica Sinica, 2015, 36 (12): : 3896 - 3909
  • [7] A Fuzzy Dynamic Bayesian Network-Based Situation Assessment Approach
    Naderpour, Mohsen
    Lu, Jie
    Zhang, Guangquan
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ - IEEE 2013), 2013,
  • [8] Network security situation assessment model based on information quality control
    Ren, Junjun
    [J]. Ren, Junjun (renjunjun9855@163.com), 1600, Totem Publishers Ltd (16): : 673 - 680
  • [9] Multiobjective network security dynamic assessment method based on Bayesian network attack graph
    Xie, Jialiang
    Zhang, Shanli
    Wang, Honghui
    Chen, Mingzhi
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2024, 17 (01) : 38 - 60
  • [10] RETRACTED ARTICLE: Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction
    Pu Zaiyi
    [J]. The Journal of Supercomputing, 2020, 76 : 1342 - 1357