期刊文献+

BP神经网络的网络安全态势评估探讨 被引量:1

Discussion on Network Security Situation Assessment of BP Neural Network
下载PDF
导出
摘要 随着网络攻击行为事件的频繁发生,互联网安全受到人们的持续关注,人们对于网络安全性能也有了更高的要求。网络安全态势分析提升了网络发展趋势,应用遗传算法优化改进BP神经网络权值以此来获取全局最优解,加快了网络收敛速度,并将其应用在训练好的网络安全态势评估模型中,实验结果表明,提出的基于BP神经网络安全态势评估模型中具备较好的训练集以及收敛速度,评估效率也更符合预期值。 With the frequent occurrence of network attack events,Internet security has received continuous attention,and people have higher requirements for network security performance.Network security situation analysis improves the development trend of Internet.The genetic algorithm is used to optimize and improve BP neural network weights,so as to obtain the global optimal solution and speed up network convergence,and then it is applied to the trained network security situation assessment model.The experimental results show that the proposed assessment model based on BP neural network security situation has a better training set and convergence speed,and the evaluation efficiency is also in line with the expected value.
作者 朱敏 ZHU Min(Center for Modern Education technology,Meizhouwan Vocational and Technical College,Putian 351119,China)
出处 《长春大学学报》 2021年第12期6-11,共6页 Journal of Changchun University
基金 福建省2018年中青年教师教育科研项目(JZ181031)。
关键词 安全态势感知 BP神经网络 训练集 security situation awareness BP neural network training set
  • 相关文献

参考文献5

二级参考文献38

  • 1陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 2胡威 Li Jianhua Jiang Xinghao Zhang Yueguo Chen Xiuzhen.A hierarchical algorithm for cyberspace situational awareness based on analytic hierarchy process[J].High Technology Letters,2007,13(3):291-296. 被引量:8
  • 3Bratman M. Intentions, Plans and Practical Reason [M]. Massachusetts: Harvard University Press, 1987. 被引量:1
  • 4Heinze C. Modeling intention recognition for intelli- gent agent systems[D]. Melbourne: the University ofMelbourne, Australia, 2003. 被引量:1
  • 5Tahboub K A. Intelligent human-machine interac- tion based on dynamic bayesian networks probabilis- tic intention recognition[J]. Journal of Intelligent and Robotic Systems, 2006, 45(1):31-52. 被引量:1
  • 6Sheyner Oleg, Haines Joshua, .Tha Somesh, et al. Automated generation and analysis of attack graphs [C]//Proceedings of the 2002 IEEE Symposium on Security and Privacy, Washington, 2002:273-284. 被引量:1
  • 7Noel S, Jajodia S. Understanding complex network attack graphs through clustered adjacency matrices [C]//Proc of the 21st Annual Computer Security Applications Conf, Washington, 2005 : 160-169. 被引量:1
  • 8Ou X, Govindavajhala S, Appel A W. MulVAL: a logic-based network security analyzer[C]//Proceed- ings of the 14th Usenix Security Symposium, New York: ACM, 2005:336-345. 被引量:1
  • 9Williams L, Lippmann R, Ingols K. GARNET: a graphical attack graph and reaehability network eval-uation tool[C]//LNCS 5210: Proc of VizSec 2008. Berlin: Springer, 2008:44-59. 被引量:1
  • 10中国互联网络信息中心.第31次中国互联网络发展状况统计报告[EB/OL]. http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjb/201403/ t20140305_46239.htm, 2014-03-05.. 被引量:12

共引文献88

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部