[1] XU Z. Demand-oriented traffic measuring method for network security situation assessment [J]. Journal of Networks, 2014, 9(4): 221-224. [2] FISCHER Y, BEYERER J. Ontologies for probabilistic situation assessment in the maritime domain [C]// CogSIMA 2013: Proceedings of the 2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support. Piscataway: IEEE, 2013: 102-105. [3] BASS T. Intrusion detection systems & multisensor data fusion: cre-ating cyberspace situational awareness [J]. Communications of the ACM, 2000, 43(4): 99-105. [4] GORODETSKY V, KARSAEV O, SAMOILOV V. On-line update of situation assessment based on asynchronous data streams [C]// Proceedings of the 8th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, LNCS 3213. Berlin: Springer, 2004: 1136-1142. [5] FRIGAULT M, WANG L, SINGHAL A, et al. Measuring network security using dynamic Bayesian network [C]// Proceedings of the 4th ACM Workshop on Quality of Protection. New York: ACM, 2008: 23-30. [6] WANG L, WANG B, PENG Y. Research the information security risk assessment technique based on Bayesian network [C]// Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering. Piscataway: IEEE, 2010: 600-604. [7] JI X, PATTINSON C. AHP implemented security assessment and security weight verification [C]// Proceedings of the 2010 IEEE Second International Conference on Social Computing. Piscataway: IEEE, 2010: 1026-1031. [8] CHEN X, ZHENG Q, GUAN X, et al. Quantitative hierarchical threat evaluation model for network security [J]. Journal of Software, 2006, 17(4):885-897.(陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897.) [9] FU Y, WU X, YE Q. Approach for information systems security situation evaluation using improved FAHP and Bayesian network [J]. Journal on Communications, 2009, 30(9): 135-140.(付钰,吴晓平,叶青.基于改进FAHP-BN的信息系统安全态势评估方法[J].通信学报,2009,30(9):135-140.) [10] LIU Q, ZHANG C, ZHANG Y, et al. Research on key technology of vulnerability threat classification [J]. Journal on Communications, 2012, 33(Z1): 79-86.(刘奇旭,张翀斌,张玉清,等.安全漏洞等级划分关键技术研究[J].通信学报,2012,33(Z1):79-86.) [11] HU W, LI J, CHEN X, et al. Improved design of the scalable net-work security situation model [J]. Journal of University of Electronic Science and Technology of China, 2009, 38(1): 113-116.(胡威,李建华,陈秀真,等.可扩展的网络安全态势评价模型优化设计[J].电子科技大学学报,2009,38(1):113-116.) [12] LI C, ZHAO J, ZHEN X. Network security situational awareness method of multi-period assessment [J]. Journal of Computer Applications, 2013, 33(12): 3506-3510.(李淳,赵健保,申晓留.多评估时间段的网络安全态势感知方法[J].计算机应用,2013,33(12):3506-3510.) [13] MIT Lincoln Laboratory. 2000 DARPA intrusion detection scenario specific data sets [EB/OL]. [2014-12-20]. http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ideval/data/2000data.html. [14] ROESCH M, GREEN C. Snort users manual [EB/OL]. [2014-12-20]. http://manual.snort.org/snort_manual.html. |