欢迎来到天天文库
浏览记录
ID:33507929
大小:346.14 KB
页数:9页
时间:2019-02-26
《一种基于网络熵的计算机攻击建模实践算法》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、APracficallAlgorithmforModelingComputerBasedAttacksUsingNetworkEntropyYirongZhan91LinruMal'2LinYan91JianxinWan911The61stResearchInstituteoftheHeadquartersoftheGeneralStaffofPLA,Beijing,PRC,1000392SchoolofElectronicScienceandEngineering,NationalUniversityofDefenseTechnology,Changsha,PRC,4100
2、73Abstractpracticalalgorithmformodelingcomputerbasedattacksusingnetworkentropywasproposedinthispaper.Theconceptofnetworkentropywasputforwardfromthepointofviewofthesecuritycharacteristicchangeofcomputernetworkbeforeandaftertheattack.Thecalculationtechniqueofnetworkentropydifferencewasanalyze
3、dindetailbyAnalyticalHierarchyProcess(AHP)andacalculationexampleofwirelessnetworkbasedonnet—workentropyisillustrated.Theimplementationoftheattackeffectevaluationverificationmethodbasedonnetworkentropywaspresented.Theelementarytestandcalculationresultsshowthatourmodelcanbepracticalformeasuri
4、ngtheactualnetworkattackeffect.KeywordsNetworkentropyAttackeffectEvaluationmodelAnalyticalhierarchyprocess(AHP)·Networksecurityindex丑。]IntroductfionWiththedevelopmentofcomputerandnetworktechniques,thescopeofinforma—tionsecuritygrowsintofoundationaltheoryandimplementationtechnologyincludinga
5、ttack,prevention,detection,managementandevaluation.Howtoevaluateattackeffectofcomputernetworkisaveryimportantpartofnetworkcountmeasures.Thetechniqueofattackeffectevaluationofcomputernetworkplaysanimportantroleintheconstructionofmoderninformationnetworksystem.Therearenoacknowledgedformalisti
6、ctheoriesaboutsecurityevaluationofinfor—mationsystemandevenlessresearchreportsandpublicationsaboutattackeffectevalua—tionbyfar.Apracticalalgorithmformodelingcomputerbasedattacksusingnetworkentropyisproposedinthispaper.Theconceptofentropyisusedtointrusiondetectionbysomeresearchers[1_5
7、.In[1]
8、theauthorshavedevelopedanentropy-basedap—proach,whichdeterminesandreportsentropycontentsoftrafficparameterssuchasIP·252·addressesforthedetectionoffastworms.InE2],theinformationentropyisadaptedtoaprofilingapproachwhichcomparesthecurrentinformationentropyw
此文档下载收益归作者所有