Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Network security situation assessment method based on Naive Bayes classifier
WEN Zhicheng, CAO Chunli, ZHOU Hao
Journal of Computer Applications    2015, 35 (8): 2164-2168.   DOI: 10.11772/j.issn.1001-9081.2015.08.2164
Abstract520)      PDF (778KB)(520)       Save

Concerning the problem that the current network security situation assessment has characteristics of limited scope, single information source, high time and space complexity and big deviation in accuracy, a new network security situation assessment method based on Naive Bayes classifier was proposed. It fully considered multi-information sources and fusion of multi-level heterogeneous information, and had the features of rapidity and high efficiency. It dynamically demonstrated the whole security state of the network, which could precisely reflect the network security situation. Finally, the proposed method was verified using the reality data from network and its validity was proved.

Reference | Related Articles | Metrics
Network security situation awareness based on weighted factor
WEN Zhicheng, CAO Chunli
Journal of Computer Applications    2015, 35 (5): 1393-1398.   DOI: 10.11772/j.issn.1001-9081.2015.05.1393
Abstract404)      PDF (913KB)(568)       Save

Concerning the problem of present network security Situation Awareness (SA) that scope is limited, time and space complexity is high with the issues of single source information and accuracy deflection, a framework of network security situational awareness with comprehensive factor weighted factor was presented. It fully considered the multiple-source and multi-level heterogeneous information fusion, thus displayed the network current security situation overall and reflected it accurately. Finally from instance data of network, the proposed model and algorithm of weighted factor network security situational awareness were verified, and the experimental results showed the validity of the proposed method.

Reference | Related Articles | Metrics