期刊文献+

基于D-S证据理论的网络安全风险评估模型 被引量:22

Security risk assessment model of network based on D-S evidence theory
下载PDF
导出
摘要 针对网络信息系统的安全风险评估问题,提出了基于D-S证据理论的风险评估模型。证据理论是一种处理不确定性的推理方法。首先用"折扣率"对Dempster合成法则进行了改进,然后使用改进后的Dempser合成法则对网络中存在的各种风险因素进行合成,减少了风险因素中的不确定性,并以实例验证了该模型在网络安全风险评估中的应用,仿真结果证明了该算法的正确性。最后,通过与模糊综合评判法进行比较验证了证据理论具有更高的准确性。 A risk assessment model that based on D-S evidence theory is proposed to solve the problems about the security risk of network information systems.Evidence theory is a reasoning method of processing uncertainty.First "discount ratio" is used to improve Demspter's rule of combination of evidence and then the improved Demspter's rule of combination of evidence is used to combine the risk factors of network.It reduces the uncertainty of risk factors.And an example is given to verify the application of this model to network risk assessment and the simulation result shows the correctness of the algorithm.Finally,it is verified that evidence theory had higher accuracy than fuzzy comprebensive evaluation method.
作者 高会生 朱静
出处 《计算机工程与应用》 CSCD 北大核心 2008年第6期157-159,168,共4页 Computer Engineering and Applications
关键词 D—S证据理论 网络安全 风险评估 Dempster合成法则 D-S evidence theory network security risk assessment Demspter's rule of combination of evidence
  • 相关文献

参考文献8

  • 1Hong Y Y,Lee L H,Cheng H H.Reliability assessment of protection system for switchyard using fault-tree analysis[C]//International Conference on Power System Technology 2006,PowerCon 2006,2006 (10):1-8. 被引量:1
  • 2赵冬梅,徐宁,马建峰.无线网络安全的风险评估[J].网络安全技术与应用,2006(3):91-93. 被引量:8
  • 3Ji S,Li X,Ma Y,et al.Optimal tolerance allocation based on fuzzy comprehensive evaluation and genetic algorithm[J].The International Journal of Advanced Manufacturing Technology,2000,16(7):461-468. 被引量:1
  • 4Ahmed A A,Mohamed D.New technique for combining multiple classifiers using the dempster-shafer theory of evidence[J].Journal of Artificial Intelligence Research, 2002( 17 ) : 333-361. 被引量:1
  • 5段新生著..证据理论与决策、人工智能[M].北京:中国人民大学出版社,1993:207.
  • 6Liu Yan-qiong,Chen Ying-wu,Gao Feng,et al.Risk evaluation using evidence reasoning theory[C]//Proceedings of the Fourth International Conference on Machine Learning and Cybernetics,2005 (10) :2855-2860. 被引量:1
  • 7Wierman M J.Measuring conflict in evidence theory[C]//Joint 9th IFSA World Conqress and 20th NAFIPS International Conference 2001,2001 (3) : 1741-1745. 被引量:1
  • 8GB 17859-1999.计算机信息系统安全保护等级划分准则[S].北京:中国标准出版社,1999. 被引量:1

二级参考文献3

共引文献7

同被引文献194

引证文献22

二级引证文献98

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部