期刊文献+

基于博弈论与信息融合的用户行为预测算法

Research on User Behavior Predicting Algorithm Based on Game Theory and Information Fusion Theory
下载PDF
导出
摘要 为了解决网络内部威胁的问题,分析了现有的基于模型、图形理论以及访问控制算法的解决方案,发现大部分方案都依赖传统的入侵检测手段,其虚警率高。为此,文章提出一种基于博弈论与信息融合的内部威胁者行为的预测算法,采用动态贝叶斯网络(DBN)结构及其精确推理算法,获取信息并融合不同的源信息用于行为分析,通过可数响应性均衡(QRE)计算预测内部威胁者的行为趋势。模拟仿真验证结果表明,该算法能预测内部威胁者的行为趋势,获得态势感知能力,能解决内部威胁问题,且算法具有良好的收敛性和精确度。 In order to solve the problem of internal network threats,the existing solutions were analyzed based on model,graph theory and access control algorithm.Most of them are depended upon traditional intrusion detection system which are impacted by false positive rate and not suitable for insider problem.In this paper,we proposed our algorithm for insider threat situation awareness,which is based on game theory and information fusion.We use DBN structure and exact inference to acquire and fuse different type of insider information for behavior analysis.As a result of simulation experiment,the algorithm can predict the behavior trend of the internal threat,obtain situation awareness,and solve the internal threat problem.The algorithm has good convergence performance and accuracy.
作者 邱东利 赵军 江东 王晓龙 QIU Dongli;ZHAO Jun;JIANG Dong;WANG Xiaolong(National Institute of Measurement and Testing Technology Test Technology,Chengdu 610021 China)
出处 《西华大学学报(自然科学版)》 CAS 2023年第4期32-42,共11页 Journal of Xihua University:Natural Science Edition
关键词 内部威胁者 态势感知 可数响应性均衡 动态贝叶斯网络 信息融合 用户行为 insider situation awareness quantal response equilibrium DBN information fusion user behavior
  • 相关文献

参考文献1

二级参考文献13

  • 1陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 2Lakkaraju K, Yurcik W, Lee A J. NVisionIP: NetFlow visualizations of system state for security situational awareness [C] //Proc of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York: ACM, 2004:65-72 被引量:1
  • 3Yin Xiaoxin, Yurcik W, Treaster M, et al. VisFlowConnect: NetFlow visualizations of link relationships for security situational awareness [C] //Proc of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York: ACM, 2004:26-34 被引量:1
  • 4朱亮,王慧强,郑丽君.网络安全态势可视化研究评述[OL].[2008-01-08].http://www.paper.edu.cn/downloadpaper.php?serial_number=200607-36 被引量:2
  • 5Bass T. Intrusion detection systems & multisensor data fusion: Creating Cyberspace Situational Awareness [J].Communications of the ACM, 2000, 43(4): 99-105 被引量:1
  • 6D'Ambrosio B. Security situation assessment and response evaluation (SSARE) [C]//DISCEX'01. Proceedings: DARPA Information Survivability Conference & Exposition Ⅱ. Los Alamitos: IEEE Computer Society, 2001:387-394 被引量:1
  • 7Gorodetsky V, Karsaev O, Samoilov V. On-line update of situation assessment based on asynchronous data streams [C]//Knowledge Based Intelligent Information and Engineering Systems. Berlin/Heidelberg: Springer, 2004 : 1136-1142 被引量:1
  • 8Yegneswaran V, Barford P, Paxson V. Using Honeynets for Internet situational awareness [C/OL]//Proc of ACM/USENIX Hotnets Ⅳ. 2005 [2008-01-12]. http://www. icir. org/vern/papers/sit-aware-hotnet05. pdf 被引量:1
  • 9Dempster A P. Upper and lower probabilities induced by a multi-valued mapping [J]. Annals of Mathematical Statistics, 1967, 38(2): 325-339 被引量:1
  • 10Sharer G. A Mathematical Theory of Evidence [M]. Princeton: Princeton University Press, 1976 被引量:1

共引文献165

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部