[1] GROUP N. 2014 Global Threat intelligence report [R/OL]. [2014-03-27]. https://us.query.ntt.com/en/resources/white-papers/global-threat-intelligence-report.html. [2] Verizon. 2013 Data Breach Investigations Report [R/OL]. [2013-04-23]. http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf. [3] 穆成坡,黄厚宽,田盛丰,等.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. (MU C P, HUANG H K, TIAN S F, et al. Intrusion-detection alerts processing based on fuzzy comprehensive evaluation[J]. Journal of Computer Research and Development, 2005, 42(10): 1679-1685.) [4] FATEMEH K, BEHZAD A. Automatic learning of attack behavior patterns using Bayesian[C]//IST 2012: Proceedings of the 2012 International Symposium on Telecommunications. Washington, DC: IEEE Computer Society, 2012: 999-1004. [5] ALIJABAR R, KOUROSH D A, ALI JI. Multi-level fusion to improve threat pattern recognition in cyber defense[J]. Journal of Mathematics and Computer Science, 2014, 8(2014): 398-410. [6] 梅海彬,龚俭多.IDS环境中基于可信度的警报关联方法研究[J].通信学报,2011,32(4):138-146. (MEI H B, GONG J D. Research on alert correlation method based on alert confidence in multi-IDS environment[J]. Journal on Communications, 2011, 32(4): 138-146.) [7] 李龙营.入侵检测警报综合分析方法的研究与实现[D].西安:西安电子科技大学,2014:25-30. (LI L Y. Comprehensive analysis approach of intrusion detection alerts and its implementation [D]. Xi'an: Xidian University, 2014: 25-30.) [8] TIAN Z, FANG B. A vulnerability-driven approach to active alert verification for accurate and efficient intrusion detection[J]. WSEAS Transactions on Communications, 2005, 4(10): 1002-1009. [9] 韦勇,连一峰,冯登国.基于信息融合的网络安全态势评估模型[J].计算机研究与发展,2009,46(3):353-362. (WEI Y, LIAN Y F, FENG D G. A network security situational awareness model based on information fusion[J]. Journal of Computer Research and Development, 2009, 46(3): 353-362.) [10] 刘靖,刘建伟,张铁林,等.安全报警融合环境中信息的关联[J].计算机工程与应用,2011,47(25):107-111. (LIU J, LIU J W, ZHANG T L, et al. Association of information in security alerts fusion environment[J]. Computer Engineering and Applications, 2011, 47(25): 107-111.) [11] 何肖慧,田盛丰,穆成坡,等.分布式入侵检测环境中报警信息整合模型的设计与实现[J].计算机科学,2006,33(11):266-269. (HE X H, TIAN S F, MU C P, et al. Designing and implementation of distribute intrusion detection system alerts fusion model[J]. Computer Science, 2006, 33(11): 266-269.) [12] RAJARAMAN A, ULLMAN J D.互联网大规模数据挖掘与分布式处理[M].王斌,译.2版.北京:人民邮电出版社,2014:110-112. (RAJARAMAN A, ULLMAN J D. Mining of massive datasets[M]. WANG B, translated. 2nd ed. Beijing: Posts & Telecom Press, 2014: 110-112.) [13] 李弼程,王波,魏俊,等.一种有效的证据理论合成公式[J].数据采集与处理,2002,17(1):34-36. (LI B C, WANG B, WEI J, et al. An efficient combination rule of evidence theory[J]. Journal of Data Acquisition & Processing, 2002, 17(1): 34-36.) [14] 赖积保.基于异构传感器的网络安全态势感知若干关键技术研究[D].哈尔滨:哈尔滨工程大学,2009:54-73. (LAI J B. Research on some key technologies for heterogeneous sensors-based network security situation awareness [D]. Harbin: Harbin Engineering University, 2009: 54-73.) |