期刊文献+

基于BP神经网络的网络安全指标体系构建 被引量:1

Construction of network security indication-system based on back propagation neural network
下载PDF
导出
摘要 频繁发生的网络安全事件带来各类严重威胁,构建网络安全指标体系对掌握宏观的网络安全状态具有重要意义。文章采用基于BP神经网络的网络安全指标体系建模的方式,对网络安全态势进行评估,然后进一步对网络安全指标体系模型进行优化和改良。研究比较不同建模参数下的指标体系构建效果,最终通过比较分析,拟合得到较优BP模型构建方式。 Frequent network security incidents bring various serious threats,and building network security indication-system( NSIS) is of great significance for mastering the macro network security state. In this paper,the NSIS model based on back propagation neural network is used to evaluate the network security situation,and then the NSIS model is further optimized and improved. The construction effects of indication-system are researched and compared under different modeling parameters. Finally,through comparative analysis,a better BP model construction will be achieved.
作者 刘海天 韩伟红 贾焰 Liu Haitian;Han Weihong;Jia Yan(College of Computer, National University of Defense Technology, Changsha 410073, China;Network Space Advanced Technology Research Institute, Guangzhou University, Guangzhou 510006, China;Guangdong Institute of Electronic Information Engineering, University of Electronic Science and technology of China, Dongguan 523808, China)
出处 《信息技术与网络安全》 2018年第4期26-29,共4页 Information Technology and Network Security
基金 国家重点研发计划(2016YFB0800303) 东莞市引进创新科研团队计划
关键词 BP神经网络 网络安全指标体系 基础运行指数 指标权值 收敛性 网络安全态势 back propagation neural network (BPNN) network security indication-system(NSIS) basic operating index indicator weight convergence network security situation
  • 相关文献

参考文献5

二级参考文献19

  • 1陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 2Software Engineering Institute Carnegie Mellon. CERT Statistics [EB/OL]. [2009-01-02]. http://www. cert. org/ stats. 被引量:1
  • 3Arhaugh A, Fithen L, John McHugh. Windows of vulnerability: A case study analysis [J]. IEEE Computer, 2000. 33:52-29. 被引量:1
  • 4Skaggs B, Blackhurn B, Manes G, et al. Network vulnerability analysis [C]//Proc of the 45th IEEE Midwest Syrup on Circuits and Systems. Piscataway, NJ: IEEE, 2002:493-495. 被引量:1
  • 5Wales E. Vulnerability assessment tools [J]. Network Security, 2003 (7): 15-17. 被引量:1
  • 6Abedin M, Nessa S, AI Shacr E, et al. Vulnerability analysis for evaluating quality of protection of security policies [C]//Proc of the 2nd ACM CCS Workshop on Quality of Protection. New York: ACM, 2006:49-52. 被引量:1
  • 7Ahmed M, Al-Shaer E, Khan L. A novel quantitative approach for measuring network security [C] //Proc of the 27th Conf on Computer Communications. Piscataway, NJ: IEEE, 2008:1957-1965. 被引量:1
  • 8Ambrosio B, Takikawa M, Upper D, et al. Security situation assessment and response evaluation[C] //Proc of DARPA Information Survivability Conf & Exposition II. Piscataway, NJ: IEEE, 2001:387-394. 被引量:1
  • 9Porras P, Fong M, Valdes A. A mission-impact-based approaeh to INFOSEC alarm correlation [C]//Proe of the 15th Int Syrup on Recent Advances in Intrusion Detection. Berlin: Springer, 2002:95-114. 被引量:1
  • 10Schneier B. Attack Trees [J]. Dr. Dobb's Journal, 1999, 24 (12): 21-29. 被引量:1

共引文献98

同被引文献16

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部