2017 IEEE International Conference on Intelligence and Security Informatics (ISI) 2017
DOI: 10.1109/isi.2017.8004873
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical network threat situation assessment method for DDoS based on D-S evidence theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…Wang [3] designed a hierarchical network security situation assessment method based on Analytic Hierarchy Process (AHP), using the Cyber threads Situation Assessment (CSA) index system constructed by AHP to determine the weight value of network threats. Liu [4] used D-S evidence theory to fuse the measured indicators to obtain device threat values. Then, they used AHP to calculate the weights of different devices, and finally obtained the network threat situation value through the weighted method.…”
Section: Related Workmentioning
confidence: 99%
“…Wang [3] designed a hierarchical network security situation assessment method based on Analytic Hierarchy Process (AHP), using the Cyber threads Situation Assessment (CSA) index system constructed by AHP to determine the weight value of network threats. Liu [4] used D-S evidence theory to fuse the measured indicators to obtain device threat values. Then, they used AHP to calculate the weights of different devices, and finally obtained the network threat situation value through the weighted method.…”
Section: Related Workmentioning
confidence: 99%
“…The approach makes threat analysis easier and enables effective examination of potential threats in the network system. Zihao et al (2017) computes metrics representing network conditions at each layer and then fuses these metrics with D-S evidence theory to estimate influence. A hidden Markov model extension was used to assess the cyber security situation by Liao et al (2020) .…”
Section: Related Workmentioning
confidence: 99%
“… is the residual variance between fitting result and actual value. AIC criterion is defined, formula (5)(6).…”
Section: Arima Modeling Stepsmentioning
confidence: 99%
“…Previous work, such as Game theory [4], D-S evidence theory [5] and artificial immunity [6] have proposed to percept the security situation of IT systems by assessing the impact on system status under attacks. The assessment methods have been quite mature, providing strong theoretical support for the situation assessment in security.…”
Section: Introductionmentioning
confidence: 99%