Defense Strategy of Network Security based on Dynamic Classification

被引:5
|
作者
Wei, Jinxia [1 ]
Zhang, Ru [1 ,2 ]
Liu, Jianyi [1 ]
Niu, Xinxin [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Natl Engn Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Key Lab Trustworthy Distributed Comp & Serv, Beijing 100876, Peoples R China
关键词
Dynamic classification defense; Fuzzy theory; Membership function; Security element; Membership matrix; ATTACKS; PROTOCOLS; DOS;
D O I
10.3837/tiis.2015.12.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, due to the network security defense is mainly static defense, a dynamic classification network security defense strategy model is proposed by analyzing the security situation of complex computer network. According to the network security impact parameters, eight security elements and classification standard are obtained. At the same time, the dynamic classification algorithm based on fuzzy theory is also presented. The experimental analysis results show that the proposed model and algorithm are feasible and effective. The model is a good way to solve a safety problem that the static defense cannot cope with tactics and lack of dynamic change.
引用
收藏
页码:5116 / 5134
页数:19
相关论文
共 50 条
  • [21] Exploration and Research on Oil and Gas SCADA Security Defense Based on Dynamic Fuzzy Neural Network (DFNN)
    Zhao, Menghui
    Cao, Xiedong
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COGNITIVE INFORMATICS, 2015, : 86 - 90
  • [22] DYNAMIC SECURITY: AN AGENT-BASED MODEL FOR AIRPORT DEFENSE
    Weiss, William E.
    2008 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2008, : 1320 - 1325
  • [23] Research on the Complex Computer Network Security Defense Strategy based on Cloud Computing Model and Big Data Environment
    Wang, Xiaoyan
    2015 2ND INTERNATIONAL SYMPOSIUM ON ENGINEERING TECHNOLOGY, EDUCATION AND MANAGEMENT (ISETEM 2015), 2015, : 165 - 170
  • [24] A Network Security Prediction Method Based on Attack Defense Tree
    Li, Junyi
    Wu, Yongdong
    Li, Yang
    Zhang, Ziwen
    Fouad, Hassan
    Altameem, Torki
    JOURNAL OF NANOELECTRONICS AND OPTOELECTRONICS, 2023, 18 (03) : 357 - 366
  • [25] Research on Network Security Collaborative Defense Technology Based on Swarm Intelligence and Big Data Network Security
    Bingjie, Yu
    Huifeng, Yang
    Chenjun, Sun
    Zhi, Zhang
    Jinghang, Fan
    Engineering Intelligent Systems, 2021, 29 (06): : 379 - 386
  • [26] Multi-layered based network security defense system
    Sun, Zhi-Xin
    Ren, Zhi-Guang
    Yang, Xi
    Wang, Cheng
    Tongxin Xuebao/Journal on Communications, 2007, 28 (07): : 61 - 69
  • [27] An Equivalent Scheduling Strategy for Cyberspace Mimicry Defense Based on Security Priority
    Song, Ke
    Wei, SHuai
    Zhang, WenJian
    Tan, LiBo
    2018 INTERNATIONAL CONFERENCE ON ADVANCED MECHATRONIC SYSTEMS (ICAMECHS), 2018, : 52 - 57
  • [28] An Active Security Defense Strategy for Wind Farm Based on Automated Decision
    Lai, Jun
    Duan, Bin
    Su, Yongxin
    Li, Lan
    Yin, Qiaoxuan
    2017 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, 2017,
  • [29] Network security based on router dynamic authentication
    Xi'an Jiaotong Univ, Xi'an, China
    Hsi An Chiao Tung Ta Hsueh, 6 (1-4):
  • [30] A Network Slicing Strategy for Telemedicine based on Classification
    Liu, Yajing
    Wang, Luhan
    Wen, Xiangming
    Lu, Zhaoming
    Liu, Luning
    2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC WORKSHOPS), 2020, : 191 - 196