期刊文献+

A hierarchical algorithm for cyberspace situational awareness based on analytic hierarchy process 被引量:8

A hierarchical algorithm for cyberspace situational awareness based on analytic hierarchy process
在线阅读 下载PDF
导出
摘要 The existing network security management systems are unable either to provide users with useful security situation and risk assessment, or to aid administrators to make right and timely decisions based on the current state of network. These disadvantages always put the whole network security management at high risk. This paper establishes a simulation environment, captures the alerts as the experimental data and adopts statistical analysis to seek the vulnerabilities of the services provided by the hosts in the network. According to the factors of the network, the paper introduces the two concepts: Situational Meta and Situational Weight to depict the total security situation. A novel hierarchical algorithm based on analytic hierarchy process (AHP) is proposed to analyze the hierarchy of network and confirm the weighting coefficients. The algorithm can be utilized for modeling security situation, and determining its mathematical expression. Coupled with the statistical results, this paper simulates the security situational trends. Finally, the analysis of the simulation results proves the algorithm efficient and applicable, and provides us with an academic foundation for the implementation in the security situation
出处 《High Technology Letters》 EI CAS 2007年第3期291-296,共6页 高技术通讯(英文版)
基金 Supported by the High Technology Research and Development Programme of China (No. 2003AA142160) and the National Natural Science Foundation of China (No. 60605019).
关键词 analytic hierarchical process security management situational awareness security vulnerabilities security situation 分等级算法 网络安全 脆弱点 安全局势
  • 相关文献

同被引文献46

  • 1周泽岩.论网络空间安全与治理[J].信息网络安全,2020(S01):153-155. 被引量:5
  • 2窦全胜,周春光,马铭.粒子群优化的两种改进策略[J].计算机研究与发展,2005,42(5):897-904. 被引量:39
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:348
  • 4王波,王灿林,梁国强.基于粒子群寻优的D-S算法[J].传感器与微系统,2007,26(1):84-86. 被引量:14
  • 5Hurley Edward. Attacks evolving toward exploiting network services[EB/OL].(2003-12-2)[2008-05-15], http://searchescurity. techtarget.com/news/article/0,289142,sid14_gci939419,00. html.
  • 6Porras P, Fong M, Valdes A. A mission-impact-based approach to INFOSEC alarm correlation[C]//Proc of the 15th Int'l Symp on Recent Advances in Intrusion Detection. Berlin: Springer-Verlag Publisher, 2002:95-114.
  • 7Hariri S, Qu G Z, Dharmagadda T, et al. Impact analysis of faults and attacks in large-scale networks[J]. IEEE Security & Privacy, 2003, 1(5):49-54.
  • 8Hanemann A, Schmitz D, Sailer M. A framework for failure impact analysis and recovery with respect to service level agreements[C]//Proc of 2005 IEEE Int'l Con on Services Computing. Piscataway: IEEE Publisher, 2005: 49-58.
  • 9Krugel C, Toth T, Kirda E. Service specific anomaly detection for network intrusion detection[C]//Proc of the ACM Symp on Applied Computing. New York: ACM Publisher, 2002: 201-208.
  • 10Bass T. Intrusion detection system and multi-sensor data fusion[J]. Communications of the ACM, 2000, 43(4): 99-105.

引证文献8

二级引证文献88

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部