Abstract | ||
---|---|---|
The development of the network technology faces with security attack challenges. It is difficult but important to trace the source of the attack from massive attack alarms. This paper proposes an attack path reconstruction method to detect the attack behavior. Firstly, the study deigns fusion algorithm to reduce the redundancy attack alarms. Then attack path reconstruction method based on attack similarity computation is presented. This paper also conducts application to evaluate effectiveness of the techniques. |
Year | Venue | Keywords |
---|---|---|
2017 | 2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD) | attack path reconstruction, attack fusion, security situation awareness, similarity computation |
Field | DocType | Citations |
Data mining,Telecommunications network,Similarity computation,Computer science,Redundancy (engineering),Knowledge extraction,Artificial intelligence,Fuzzy control system,Fuse (electrical),Network attack,Machine learning | Conference | 0 |
PageRank | References | Authors |
0.34 | 0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jian-Wei Tian | 1 | 0 | 0.34 |
Xi Li | 2 | 108 | 29.17 |
Zhen Tian | 3 | 0 | 0.34 |
Weihui Qi | 4 | 0 | 0.34 |