检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:徐健 冯宝龙[1] XU Jian;FENG Bao-long(Northeast Agricultural University,Harbin Heilongjiang 150038,China)
出 处:《计算机仿真》2023年第6期449-452,458,共5页Computer Simulation
摘 要:为明确入侵攻击对无线网络产生的不良影响,精准呈现网络安全态势走向,设计一种基于证据推理规则的无线网络安全态势量化评估方法。围绕保密性、完整性、可靠性、可用性原则,创建无线网络安全态势评估指标体系。利用模糊调度策略,构建网络安全态势数据采集模型,获取网络安全态势特征序列,代入告警质量因子,从告警频率、告警重要水平和告警严重水平三方面实现入侵攻击检测;全方位考虑正常行为和入侵攻击行为差异,将网络资源要素变化作为评估核心,使用证据推理规则计算无线网络安全等级,量化计算得到最终的安全态势值,展现网络安全变化情况。实验结果表明,所提方法安全态势评估结果准确、效率高,具有极强的适用性,能够为保证无线网络安全运行提供借鉴思路。In order to clarify the adverse effects of intrusion attack on wireless network system and accurately present the trend of network security,a quantitative evaluation method for wireless network security situation was de-signed based on evidential reasoning rules.Based on the principles of confidentiality,integrity,reliability and availa-bility,an evaluation system was constructed for wireless network security situation.And then,the fuzzy scheduling strategy was adopted to construct a model for collecting network security situation data and thus to obtain a sequence of network security situation features.Meanwhile,the quality factor of alerts was introduced,so that intrusion attack detection can be completed from the aspects of alarm frequency,alarm importance level and alarm severity level.Mo-reover,the difference between normal behavior and intrusion attack behavior was considered in an all-round way,and the change of network resource elements was taken as the core of assessment at the same.Finally,evidential reasoning rules were adopted to calculate the security level of wireless network.After the quantitative calculation,the security situation value shows the changes of network security.The experimental results show that the proposed method pro-vides accurate and efficient assessment results of security situation.In addition,this method has strong applicability and can provide reference ideas for ensuring the safe operation of wireless network.
关 键 词:入侵攻击 无线网络 安全态势 量化评估 证据推理规则
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.185