Research on the Key Technologies of Network Security-Oriented Situation Prediction

被引:4
|
作者
Zhu, Yikun [1 ]
Du, Zhiling [2 ]
机构
[1] Wuhan Text Univ, Sch Mech Engn & Automat, Wuhan 430000, Hubei, Peoples R China
[2] East China Jiaotong Univ, Sch Econ & Management, Nanchang 330013, Jiangxi, Peoples R China
关键词
PHYSICAL LAYER SECURITY; NONORTHOGONAL MULTIPLE-ACCESS; INTRUSION DETECTION; WIRELESS NETWORKS; SUPPORT;
D O I
10.1155/2021/5527746
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In today's increasingly severe network security situation, network security situational awareness provides a more comprehensive and feasible new idea for the inadequacy of various single solutions and is currently a research hotspot in the field of network security. At present, there are still gaps or room for improvement in network security situational awareness in terms of model scheme improvement, comprehensive and integrated consideration, algorithm design optimization, etc. A lot of scientific research investments and results are still needed to improve the form of network security in a long and solid way. In this paper, we propose a network security posture assessment model based on time-varying evidence theory for the existing multisource information fusion technology that lacks consideration of the problem of threat occurrence support rate over time and make the threat information reflect the law of time change by introducing a time parameter in the basic probability assignment value. Thus, the existing hierarchical threat posture quantitative assessment technique is improved and a hierarchical multisource network security threat posture assessment model based on time-varying evidence theory is proposed. Finally, the superiority of the proposed model is verified through experiments.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Research on Key Method of Cyber Security Situation Awareness Based on ResMLP and LSTM Network
    Fan, Zhijie
    Zhao, Ping
    Jin, Bo
    Tang, Qianjin
    Zheng, Changsong
    Li, Xin
    [J]. IETE JOURNAL OF RESEARCH, 2024, 70 (03) : 2716 - 2730
  • [42] Key Technologies of Wireless Heterogeneous Network Security
    Wu Meng
    [J]. ZTE Communications, 2008, (03) : 34 - 39
  • [43] Security-oriented cloud computing platform for critical infrastructures
    Mackay, M.
    Baker, T.
    Al-Yasiri, A.
    [J]. COMPUTER LAW & SECURITY REVIEW, 2012, 28 (06) : 679 - 686
  • [44] A security-oriented task scheduler for heterogeneous distributed systems
    Xie, Tao
    Qin, Xiao
    [J]. HIGH PERFORMANCE COMPUTING - HIPC 2006, PROCEEDINGS, 2006, 4297 : 35 - +
  • [45] Secure tropos: A security-oriented extension of the tropos methodology
    Mouratidis, Haralambos
    Giorgini, Paolo
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2007, 17 (02) : 285 - 309
  • [46] On Network Security Situation Prediction Based on RBF Neural Network
    Jiang, Yang
    Li, Cheng-hai
    Yu, Li-shan
    Bao, Bo
    [J]. PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 4060 - 4063
  • [47] Architectural Patterns for Security-Oriented Workflows in Collaborative Environments
    Hussain, Sardar
    Sinnott, Richard O.
    Poet, Ron
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 406 - 421
  • [48] Security-oriented agile approach with AgileSafe and OWASP ASVS
    Lukasiewicz, Katarzyna
    Cyganska, Sara
    [J]. PROCEEDINGS OF THE 2019 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2019, : 875 - 878
  • [49] Security-oriented Data Grids for Microarray Expression Profiles
    Sinnott, Richard
    Bayliss, Christopher
    Jiang, Jipu
    [J]. FROM GENES TO PERSONALIZED HEALTHCARE: GRID SOLUTIONS FOR THE LIFE SCIENCES, 2007, 126 : 67 - +
  • [50] PowerScout: Security-Oriented Power Delivery Network Modeling for Side-Channel Vulnerability Analysis
    Zhu, Huifeng
    Guo, Xiaolong
    Jin, Yier
    Zhang, Xuan
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2024, 12 (02) : 532 - 545