Research on the Key Technologies of Network Security-Oriented Situation Prediction

被引:4
|
作者
Zhu, Yikun [1 ]
Du, Zhiling [2 ]
机构
[1] Wuhan Text Univ, Sch Mech Engn & Automat, Wuhan 430000, Hubei, Peoples R China
[2] East China Jiaotong Univ, Sch Econ & Management, Nanchang 330013, Jiangxi, Peoples R China
关键词
PHYSICAL LAYER SECURITY; NONORTHOGONAL MULTIPLE-ACCESS; INTRUSION DETECTION; WIRELESS NETWORKS; SUPPORT;
D O I
10.1155/2021/5527746
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In today's increasingly severe network security situation, network security situational awareness provides a more comprehensive and feasible new idea for the inadequacy of various single solutions and is currently a research hotspot in the field of network security. At present, there are still gaps or room for improvement in network security situational awareness in terms of model scheme improvement, comprehensive and integrated consideration, algorithm design optimization, etc. A lot of scientific research investments and results are still needed to improve the form of network security in a long and solid way. In this paper, we propose a network security posture assessment model based on time-varying evidence theory for the existing multisource information fusion technology that lacks consideration of the problem of threat occurrence support rate over time and make the threat information reflect the law of time change by introducing a time parameter in the basic probability assignment value. Thus, the existing hierarchical threat posture quantitative assessment technique is improved and a hierarchical multisource network security threat posture assessment model based on time-varying evidence theory is proposed. Finally, the superiority of the proposed model is verified through experiments.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Research key technologies of the current network security situation awareness
    Guan, X. J.
    Zhang, T.
    Ma, Y. Y.
    Deng, S.
    [J]. MANUFACTURING AND ENGINEERING TECHNOLOGY, 2015, : 149 - 154
  • [2] Security-Oriented Network Architecture
    Jiang, Weiyu
    Liu, Bingyang
    Wang, Chuang
    Yang, Xue
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [3] On some directions in security-oriented research
    Sekanina, Lukas
    Hruska, Tomas
    Vojnar, Tomas
    Kolar, Dusan
    Cernocky, Jan
    [J]. 2007 ECSIS SYMPOSIUM ON BIO-INSPIRED, LEARNING, AND INTELLIGENT SYSTEMS FOR SECURITY, PROCEEDINGS, 2007, : 141 - +
  • [4] Security-Oriented Network Slice Backup Method
    Chen, Ke
    Wang, Ying
    Yu, Peng
    Li, Naling
    [J]. 2021 22ND ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2021, : 330 - 335
  • [5] Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction
    KOU Guang
    WANG Shuo
    TANG Guangming
    [J]. Chinese Journal of Electronics, 2019, 28 (01) : 162 - 171
  • [6] Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction
    Kou Guang
    Wang Shuo
    Tang Guangming
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (01) : 162 - 171
  • [7] Supporting security-oriented, collaborative nanoCMOS electronics research
    Sinnott, Richard O.
    Doherty, Thomas
    Martin, David
    Millar, Campbell
    Stewart, Gordon
    Watt, John
    [J]. COMPUTATIONAL SCIENCE - ICCS 2008, PT 1, 2008, 5101 : 96 - 105
  • [8] Tool Support for Security-oriented Virtual Research Collaborations
    Watt, John
    Sinnott, Richard
    Jiang, Jipu
    Doherty, Tom
    Higgins, Chris
    Koutroumpas, Michael
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 419 - 424
  • [9] Research on Key Technologies of Network Security Management Policy
    Tang, Chenghua
    Yu, Shunzheng
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12530 - 12533
  • [10] The Research of the Network Security Situation Prediction mechanism Based on the complex network
    Sun, Shouxin
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1183 - 1187