期刊文献+

网络安全管理平台中的数据融合技术 被引量:5

Data Fusion in Network Security Management Platform
在线阅读 下载PDF
导出
摘要 针对目前网络安全产品孤立 ,缺乏协调统一的运营机制这一现状 ,本文提出“网络安全管理平台”实现对网络安全设备的统一管理。其关键技术采用数据融合的方法 ,解决了将冗杂繁多且格式不统一的安全日志信息融合为统一的安全日志的问题 ,并进一步采用数据拟合及神经网络 BP算法对网络环境进行态势评估和威胁估计 ,使用户了解所在网络的安全状况及薄弱环节 ,进而及时地采取更加有效的防护措施。 Now our network security devices have some shortc om ing that they all work alone and can not assort with each other. So the article brings foreword “The Network Security Management Platform” to manage all the devices altogether. By the key technology data fusion, we resolve the problem t hat so many and different logs are fused into one log, and we can get situation assessment and threat assessment by means of BP arithmetic. Thus, out users can find out the network situation and the weakness, and take some effective steps .
出处 《现代电子技术》 2004年第24期69-70,77,共3页 Modern Electronics Technique
关键词 信息融合 网络安全管理 态势评估 趋势预测 神经网络 BP算法 data fusion network security management situati on assessment trend forecast neutron network BP arithmetic
  • 相关文献

参考文献3

  • 1李辉,蔡忠闽,韩崇昭,管晓宏.基于信息融合的入侵检测模型与方法[J].小型微型计算机系统,2003,24(9):1602-1606. 被引量:9
  • 2Tim Bass.Intrusion Detection Systems and Multisensor Data Fusion[J].Communications 0fthe ACM,2000,43(4).
  • 3天融信公司.Topsec安全解决方案[D].http://solution.itl 68.com.

二级参考文献14

  • 1Fox K L,Henning R R, Reed J H, et al. A neural network approach toward intrusion detection[C].In : Proceedings of the 13th National Computer Security Conference, 1990,10.
  • 2Porras P. Kemmerer R. Penetration state transition analysis -a rule based intrusion detection approach[C].In:Proceedings of the Eight Annual Computer Security Application Conference, 1992.220-229.
  • 3Ming-Yuh Huang,Robert J.Jasper.A large scale distributed intrusion detection framework based on attack strategy analysis[]]. Computer Networks 1999,31. 2465-2475.
  • 4Tim Bass Intrusion Detection System -. Multisensor Data Fusion:Create Cyberspace Situational Awareness[J]. Communication of the ACM. 2000,43(4) ,99-105.
  • 5Mitiche A. Aggarwal JK multsi sensor integration/fusion through image processing : Arevial[J]. Optical Engineering. 1986,25 (3) :380-386.
  • 6Eugene Charniak Bayesian. Networks without tears[J]. AI Magazine,Winter 1991, 50-63.
  • 7Zhang yan-duo,Hong bing-rong. Recognition to the robot football from the view of information fusion[J]. Robots and Application,2001,1(1):33-35.
  • 8Kang yao-hong. Theory and application of data fusion[M]. Xi'an, XDUP 1999.
  • 9White F. A model for data fusionCC3. SPIE Conference on Sensor Fusion Orlando,FL. April, 1988.
  • 10Julia Allen, Alan Christie, William Fithen,John McHugh,Jed Pickel, Ed Stoner. State of the practice of intrusion detection technologies[R]. Networked Systems Survivability Program,Technical Report CMU/SEI-99-TR-028 ESC-99-028.

共引文献8

同被引文献24

引证文献5

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部