期刊文献+

基于GA参数优化的t-SVR网络安全风险评估方法 被引量:5

Method for evaluation of network security risk based on t-SVR with parameters optimization by GA
在线阅读 下载PDF
导出
摘要 为了提高网络安全风险评估的准确性和实时性,提出一种t时延参数优化支持向量回归机的网络安全风险评估模型(t-SVR)。利用遗传算法(GA)的全局搜索性,对t-SVR模型中的关键参数进行组合寻优。通过对网络安全风险数据集进行仿真,结果表明,基于GA参数优化的t-SVR评估模型已经解决了SVR存在的不足,提高了网络安全风险评估的准确率,缩短了评估时间,评估性能更加稳定。 In order to improve the accuracy and real-time of network security risk assessment, this paper proposes a model about network security risk assessment based on the Support Vector machine for Regression optimized by t time-delay parameter. It combines and optimizes the key parameters of t-SVR, making use of the global search performance of GA. The simulation result of network security risk data-set indicates that the assessment model of t-SVR evaluation based on GA parameter optimization has solved the shortage of SVR, and the risk assessment is made more accurate, the time more less and the performance more stable.
出处 《计算机工程与应用》 CSCD 2014年第12期91-95,共5页 Computer Engineering and Applications
基金 甘肃省自然科学基金(No.1208RJZA191)
关键词 网络安全风险 t-支持向量回归机(SVR)评估模型 遗传算法 参数组合寻优 network security risk t-Support Vector machine for Regression(SVR) assessment model Genetic Algorithm(GA) optimal parameters combination
  • 相关文献

参考文献16

  • 1Rossi F, Villa N.Support vector machine for functional data classification[D].Neurocomputing,2006,69(9) :730-742.
  • 2Gosselin L, Tye-Gingras M, Mathieu-Potvin F.Review of utilization of genetic algorithms in heat transfer prob- lems[J].International Journal of Heat and Mass Transfer, 2009,52(10) :2169-2188.
  • 3杨晓宇,周佩玲,傅忠谦.人工免疫与网络安全[J].计算机仿真,2001,18(6):83-85. 被引量:28
  • 4肖道举,杨素娟,周开锋,陈晓苏.网络安全评估模型研究[J].华中科技大学学报(自然科学版),2002,30(4):37-39. 被引量:63
  • 5汪楚娇,林果园.网络安全风险的模糊层次综合评估模型[J].武汉大学学报(理学版),2006,52(5):622-626. 被引量:38
  • 6Bonafede C E, Giudici P.Bayesian networks for enterprise risk assessment[J].Physica A: Statistical Mechanics and Its Applications, 2007,382( 1 ) : 22-28.
  • 7Schmidt S,Steele R,Dillon T S,et al.Fuzzy trust evalua- tion and credibility development in multiagent systems[J]. Applied Soft Computing, 2007,7 (2) : 492-505.
  • 8Frigault M, Wang Lingyu.Measuring network security using dynamic Bayesian network[C]//Proc of the 4th ACM Workshop on Quality of Protection.New York-ACM Press, 2008 : 23-30.
  • 9Poolsappasit N, Dewri R, Ray I.Dynamic security risk man- agement using Bayesian attack graphs[J].IEEE Trans on Dependable and Secure Computing, 2012,9( 1 ) :61-74.
  • 10何永明.基于KNN-SVM的网络安全态势评估模型[J].计算机工程与应用,2013,49(9):81-84. 被引量:16

二级参考文献57

共引文献306

同被引文献53

  • 1Bou-Harb E,Fachkha C,Pourzandi M,et al.Communication security for smart grid distribution networks[J].IEEE Communications Magazine,2013,51(1):42-49.
  • 2Ou X M,Boyer W F,Mc Queen M A.A scalable approach to attack graph generation[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security,2006:336-345.
  • 3Liu N,Zhang J H,Zhang H,et al.Security assessment for communication networks of power control systems using attack graph and MCDM[J].IEEE Trans on Power Delivery,2010,25(3):1492-1500.
  • 4Dzung D,Naedele M,Vonhoff T,et al.Security for industrial communication systems[J].Proceedings of the IEEE,2005,93(6):1152-1177.
  • 5Tao Long,Chen David,Song Ronggong.Measure large scale network security using adjacency matrix attack graphs[C]// 5th Future Tech International Conference(FUTURETECH2010),2010.
  • 6Chen F,Su J S,Zhang Y.A scalable approach to full attack graphs generation[C]//Proceedings of the lst International Symposium on Engineering Secure Software and Systems,2008:150-163.
  • 7IEC 61850-5 Communication network and systems in substations:part 5 communication requirements for functions and device model[S].2003.
  • 8苘大鹏,杨武,杨永田.基于攻击图的网络脆弱性分析方法[J].南京理工大学学报,2008,32(4):416-419. 被引量:14
  • 9陈锋,张怡,苏金树,韩文报.攻击图的两种形式化分析[J].软件学报,2010,21(4):838-848. 被引量:51
  • 10张弢,慕德俊,任帅,姚磊.一种基于风险矩阵法的信息安全风险评估模型[J].计算机工程与应用,2010,46(5):93-95. 被引量:43

引证文献5

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部