RVM Assessment Model for Computer Network Attack

被引:0
|
作者
Yang, Yang [1 ]
Yu, Wang [1 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
关键词
computer network; assessment method; network attack; relevance vector machine; CLASSIFICATION;
D O I
10.1109/ICCSIT.2010.5564668
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Assessment for computer network attack is a technology for assessing hostile attacks against computer network system. In the paper, relevance vector machine is applied to assessment for computer network attack. Compared with support vector machine assessment method, the RVM method can provide better classification accuracy. The experimental data collected in the paper include U2R attack, R2L attack, Probe attack and DoS attack. It can be seen from the experimental results that it is an effective model for assessment of network attack.
引用
收藏
页码:104 / 107
页数:4
相关论文
共 50 条
  • [1] Dynamic Model on DDoS Attack in Computer Network
    Kumar, Upendra
    Pandey, Samir Kumar
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [2] Mathematical Model on Attack of Worm and Virus in Computer Network
    Mishra, Binay Kumar
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (06): : 245 - 254
  • [3] Analysis of computer network attack based on the virus propagation model
    He, Yanshan
    Wang, Ting
    Xie, Jianli
    Zhang, Ming
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [4] Analysis of computer network attack based on the virus propagation model
    Yanshan He
    Ting Wang
    Jianli Xie
    Ming Zhang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2020
  • [5] A mathematical model for a distributed attack on targeted resources in a computer network
    Haldar, Kaushik
    Mishra, Bimal Kumar
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (09) : 3149 - 3160
  • [6] A Computer Network Attack Taxonomy and Ontology
    van Heerden, R. P.
    Irwin, B.
    Burke, I. D.
    Leenen, L.
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2012, 2 (03) : 12 - 25
  • [7] Research on computer network attack modeling based on attack graph
    Wang, Guo-Yu
    Wang, Hui-Mei
    Chen, Zhi-Jie
    Xian, Ming
    [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (04): : 74 - 80
  • [8] Active cyber attack model for network system's vulnerability assessment
    Eom, Jung-ho
    Han, Young-Ju
    Park, Seon-Ho
    Chung, Tai-Myoung
    [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 153 - +
  • [9] Research on Computer Network Security Anti - attack
    Liang, Liu Zheng
    Min, Lai
    [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 188 - 191
  • [10] Discussion on the Legal Regulation of Computer Network Attack
    Zhang, Min
    Zhong, Shuangxi
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SOCIAL SCIENCE, MANAGEMENT AND SPORTS (ICESSMS 2016), 2016, 92 : 8 - 10