2019 6th International Conference on Dependable Systems and Their Applications (DSA) 2020
DOI: 10.1109/dsa.2019.00057
|View full text |Cite
|
Sign up to set email alerts
|

Quantitative Evaluation Model of Network Security Situation Based on D-S Evidence Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…To use the iForest anomaly detection method, it is necessary to determine the training sample size of the iTree in advance, that is, how many pieces of network data the iTree is constructed from, and the number of iTrees contained in the iForest [9]. The advantage of iForest algorithm in anomaly isolation is that it takes the features extracted from the data collected by the Internet of Things terminal as training samples and test samples.…”
Section: ( )mentioning
confidence: 99%
“…To use the iForest anomaly detection method, it is necessary to determine the training sample size of the iTree in advance, that is, how many pieces of network data the iTree is constructed from, and the number of iTrees contained in the iForest [9]. The advantage of iForest algorithm in anomaly isolation is that it takes the features extracted from the data collected by the Internet of Things terminal as training samples and test samples.…”
Section: ( )mentioning
confidence: 99%
“…The evidence theory and graph models are two of the most representative examples. Based on the evidence theory, for example, reference [6] proposed a network security threat situation assessment method based on unsupervised generation reasoning, which solves the shortcomings of high computational cost, time consuming and low efficiency of the supervised assessment method, and can more intuitively assess the overall situation of network threats; Reference [7] studied a network security situation assessment model based on DS evidence theory, which used principal component analysis (PCA) to preprocess the alarm data, adopted the improved DS evidence theory and combined the credibility of multi-source attack data to improve the alarm recognition rate. Based on the graph model, for example, reference [8] proposed a situation assessment method using the Seeker Optimization Algorithm to improve the hidden Markov model, which can more accurately assess the situation of network security, but there were irrelevant and false positive data in situation VOLUME XX, 2017 elements, which need further research on observation sequence; Reference [9] proposed a network security situation assessment method with Markov game model as the core and combined with four-level data fusion, which considered the interaction between attackers and defenders, so it was closer to reality and can assess the network security situation more accurately.…”
Section: ) Based On Knowledge Reasoningmentioning
confidence: 99%
“…Humpback whales not only move in a spiral manner, but also constantly narrow the search range. Therefore, assuming a 50% probability of switching between the contraction surrounding mechanism and the spiral model, the whale position is updated according to formulas ( 6) and (7).…”
Section: ) Spiral Predationmentioning
confidence: 99%
“…Guo et al 31 adopted this method to evaluate the network security status and used it to analyze the possibility of DDoS attacks on the host. Zhao et al 32 adopted the D‐S evidence theory method combined with the credibility of multisource data to improve the alarm recognition rate of the security situation assessment model. Cheng et al 33 proposed a recommendation framework based on the improved D‐S evidence theory that integrates multiple information sources and minimizes the conflicts among the evidence.…”
Section: Introductionmentioning
confidence: 99%