• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lü Huiying, Peng Wu, Wang Ruimei, Wang Jie. A Real-time Network Threat Recognition and Assessment Method Based on Association Analysis of Time and Space[J]. Journal of Computer Research and Development, 2014, 51(5): 1039-1049.
Citation: Lü Huiying, Peng Wu, Wang Ruimei, Wang Jie. A Real-time Network Threat Recognition and Assessment Method Based on Association Analysis of Time and Space[J]. Journal of Computer Research and Development, 2014, 51(5): 1039-1049.

A Real-time Network Threat Recognition and Assessment Method Based on Association Analysis of Time and Space

More Information
  • Published Date: May 14, 2014
  • How to identify successful threat activities and current security state, is the prerequisite and key to network real-time threat assessment. To do this, all the detected threats need to be associated and studied in many ways and multiple directions. Aiming at this issue, a network real-time threat identification and quantitative assessment approach is proposed based on the association analysis from two dimensions of time and space. This approach fully considers spatial complexity and temporal dynamic under network attack-defense confrontation environment. Firstly threat state transition graph is constructed to simulate intruding process and model threat scenarios. Based on the graph, by associating threat spreading paths in temporal dimension and correlating with threat state features in spatial dimension, valid threats can be filtered out and current threat state can be recognized. Then a multi-granularity hierarchical assessment method is put forward to evaluate network threat. This method takes entity value, threat weight and threat success probability as evaluation indexes in order to quantitatively analyze threat indexes of single state, path and the whole network respectively. Therefore, the results report network real-time risk situation in different levels. Finally simulation experiment verifies the effectiveness and advantage of the approach, and the approach can reveal threat situation more thoroughly and provide valuable guide for intrusion response decision-making and dynamic defense strategy adjusting.
  • Related Articles

    [1]Xu Dongzhu, Zhou Anfu, Ma Huadong, Zhang Yuan. Continuous Learning-Based Task Demand Understanding and Scheduling Method for Video Internet of Things[J]. Journal of Computer Research and Development, 2024, 61(11): 2793-2805. DOI: 10.7544/issn1000-1239.202440403
    [2]Fu Maozhong, Hu Haiyang, Li Zhongjin. Dynamic Resource Scheduling Method for GPU Cluster[J]. Journal of Computer Research and Development, 2023, 60(6): 1308-1321. DOI: 10.7544/issn1000-1239.202220149
    [3]Li Xiaoping, Zhou Zhixing, Chen Long, Zhu Jie. Task Offloading and Cooperative Scheduling for Heterogeneous Edge Resources[J]. Journal of Computer Research and Development, 2023, 60(6): 1296-1307. DOI: 10.7544/issn1000-1239.202110936
    [4]Su Mingfeng, Wang Guojun, Li Renfa. Resource Deployment with Prediction and Task Scheduling Optimization in Edge Cloud Collaborative Computing[J]. Journal of Computer Research and Development, 2021, 58(11): 2558-2570. DOI: 10.7544/issn1000-1239.2021.20200621
    [5]Xu Hongzhi, Li Renfa, Zeng Lining. Parallel Task Scheduling for Resource Consumption Minimization with Reliability Constraint[J]. Journal of Computer Research and Development, 2018, 55(11): 2569-2583. DOI: 10.7544/issn1000-1239.2018.20170893
    [6]Chen Huangke, Zhu Jianghan, Zhu Xiaomin, Ma Manhao, Zhang Zhenshi. Resource-Delay-Aware Scheduling for Real-Time Tasks in Clouds[J]. Journal of Computer Research and Development, 2017, 54(2): 446-456. DOI: 10.7544/issn1000-1239.2017.20151123
    [7]WeiWei, LiuYang, YangWeidong. A Fast Approximation Algorithm for the General Resource Placement Problem in Cloud Computing Platform[J]. Journal of Computer Research and Development, 2016, 53(3): 697-703. DOI: 10.7544/issn1000-1239.2016.20148323
    [8]Qian Manli, Li Yonghui, Huang Yi, Zhou Yiqing, Shi Jinglin, Yang Xuezhi. An Adaptive Soft Frequency Reuse Scheme for LTE Systems[J]. Journal of Computer Research and Development, 2013, 50(5): 912-920.
    [9]Yu Guoliang, Wu Weiguo, Yang Zhihua, Qian Depei. A Boundary-Table-Based Algorithm for Reconfigurable Resource Management and Hardware Task Scheduling[J]. Journal of Computer Research and Development, 2011, 48(4): 699-708.
    [10]Chen Tingwei, Zhang Bin, and Hao Xianwen. Dependent Task Scheduling in Grid Based on T-RAG Optimization Selection[J]. Journal of Computer Research and Development, 2007, 44(10): 1741-1750.

Catalog

    Article views (980) PDF downloads (865) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return