2011
DOI: 10.1007/978-3-642-24728-6_69
|View full text |Cite
|
Sign up to set email alerts
|

Network Security Situation Assessment Based on Hidden Semi-Markov Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…State MC was transferred to state G through learning, and state UC system needed manual intervention to be transferred to state G, make hA=0. 5,hMC=0.5,hUC=1,hL=0.4; The state TR determines the direction of the system transfer according to the intrusion tolerance policy, then make hTR=1/6, hGD=3, hFS=1, hF=2. It should be noted that all variables of hi( i=G, V, A, MC, UC, L, TR, GD, FS, F ) are units of time.…”
Section: Average System State Holding Timementioning
confidence: 99%
See 1 more Smart Citation
“…State MC was transferred to state G through learning, and state UC system needed manual intervention to be transferred to state G, make hA=0. 5,hMC=0.5,hUC=1,hL=0.4; The state TR determines the direction of the system transfer according to the intrusion tolerance policy, then make hTR=1/6, hGD=3, hFS=1, hF=2. It should be noted that all variables of hi( i=G, V, A, MC, UC, L, TR, GD, FS, F ) are units of time.…”
Section: Average System State Holding Timementioning
confidence: 99%
“…Literature [5] by using the hidden markov model method of time series, portrays the safety situation of the different time, the parameters of the optimization model, in order to increase the accuracy of the model parameters and objectivity, and use the forward algorithm and backward algorithm with the combination of methods to identify the probability of a single state, finally using victor than algorithm to predict the change trend of the security situation, provide reasonable data for network managers to improve the work efficiency and effectiveness. Literature [6] perceiving and obtaining securityrelated metadata from time and space dimensions through technical means, dynamically reflecting network security status and predicting its future development trend through data information fusion analysis, and finally providing reliable decision support for enhancing network security.…”
Section: Introductionmentioning
confidence: 99%