Network Security Evaluation Research Based on Rough Set Theory

被引:0
|
作者
Wang, Xuren [1 ]
He, Famei [2 ]
Wang, Yanli [1 ]
Yuan, Xiaohong [1 ]
机构
[1] Capital Normal Univ, Informat Engn Coll, Beijing, Peoples R China
[2] Beijing Inst Technol, Dept Lib, Beijing, Peoples R China
关键词
Rough Set Theory; Network Security Network security evaluation;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Network security evaluation based on Rough set theory has been developed to monitor the security situation of network. The approach mines detection rule models from network connection data. With rough set theory, several key problems can be solved, such as data completion, data discretization, and data reduction. Tests show that the network evaluation based on Rough set theory has better performance on attribute selection than before.
引用
收藏
页码:302 / 304
页数:3
相关论文
共 7 条
  • [1] Chen Xiuzhen, 2004, Journal of Xi'an Jiaotong University, V38, P1228
  • [2] Chen Xiuzhen, 2004, J XIAN JIAOTONG U, V38, P1255
  • [3] [陈志杰 CHEN ZhiJie], 2007, [计算机科学, Computer Science], V34, P98
  • [4] Lin Meng-quan, 2007, Control and Decision, V22, P951
  • [5] LIN Meng-quan, 2007, CONTROL DECISION, V22, P960
  • [6] Minimal approximate hitting sets and rule templates
    Vinterbo, S
    Ohrn, A
    [J]. INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2000, 25 (02) : 123 - 143
  • [7] WANG Gui-sheng, 2008, COMPUTER TECHNOLOGY, V18, P156