期刊文献+

大数据环境下的云计算网络安全入侵检测模型仿真 预览 被引量:14

Model Simulation for Intrusion Detection of Cloud Computing Network under Large Data Environments
在线阅读 下载PDF
分享 导出
摘要 在大数据云计算环境下,由于信息交互的开放性和自组织性,导致云计算网络容易受到攻击,研究大数据环境下的云计算网络安全入侵检测模型,提高网络安全防御能力。提出一种基于人工免疫的网络安全态势分析的网络安全入侵检测模型。构建网络安全入侵的信号模型和安全态势分析模型,通过模拟人体免疫系统,进行网络映射,采用双线性Hough变换进行时频变换,实现算法改进。仿真结果表明,采用该模型能有效提高对云计算网络入侵的检测性能,对攻击特征的识别能力较高。 Cloud computing network is vulnerable to attacks due to the openness and self-organization of information interaction. We put forward an intrusion detection model based on artificial immunizing network security analysis. By simulating human body's immune system, network mapping and double linear Hough transform were applied to improve the algorithm. The simulation results showed that the model can effectively improve the detection performance of cloud computing network intrusion, with a high recognition rate of attack characteristics.
作者 宋文超 王烨 黄勇 柳增寿 SONG Wen-chao, WANG Ye, HUANG Yong, LIU Zeng-shou (1. The third research institute of the ministry of public security, The ministry of public security information security rank protection assessment center, Shanghai 200031,China: 2. Beijing Haitai Fan~vuan technology co., LTD, Be(jing 100193, China, 3. Electronic document authenticity and security technology engineering laborato~ in Be(jing, Be~jing 100193, China, 4.Beijing military area command communication network management center, Beijing 100041, China)
出处 《中国西部科技》 2015年第8期86-88,共3页 Science and Technology of West China
关键词 大数据 云环境 网络安全 检测 Big Data Cloud Computing Network Security Detection
作者简介 宋文超(1981-),男,山东滨州人,硕士,中级测评师,主要研究领域为信息安全、等级保护、大数据等。
  • 相关文献

参考文献3

二级参考文献27

  • 1殷丽华,方滨兴.入侵容忍系统安全属性分析[J].计算机学报,2006,29(8):1505-1512. 被引量:25
  • 2Tarun Ambwani.Multi Class Support Vector Machine Im- plementation to Intrusion detection[C]//:2003 International Joint Conference on Neural Network,2003:2300-2305. 被引量:1
  • 3Madan B B, Goeva-Popstojanova K, Vaidyanathan K, et al.. A method for modeling and quantifying the security attributes of intrusion tolerant system[J]. Performance Evaluation, 2004, 56(1-4): 167-186. 被引量:1
  • 4Singh S, Cukier M, and Sanders W. Probabilistic validation of an intrusion tolerant replication systemiC]. Proceedings of International Conference on Dependable Systems and Networks, San Francisco, CA, 2003: 615-624. 被引量:1
  • 5Chen Feng, Liu De-hui, Zhang Yi, et al.. A hierarchical evMuation approach for network security based on threat spread model[J]. Journal of Computer Research and Development, 2011, 48(6): 945-954. 被引量:1
  • 6Lye K-w and Wing J. Game strategies in network security[J]. International Journal of Information Security, 2005, 4(1/2):71 86. 被引量:1
  • 7SMlhammar K, Helvik B E, and Knapskog S J. A game-theoretic approach to stochastic security and dependability evaluation[C]. Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, Indianapolis, USA, 2006: 61-68. 被引量:1
  • 8Li Yi-nan, Qian Zhi-hong, Liu Ying, et al.. An intrusion detection model of mobile Ad hoc networks based on game theory[J]. Journal of Electronics = Information Technology, 2010, 32(9): 2245-2248. 被引量:1
  • 9Bimal K M, Gholam M A. Differential epidemic model of virus and worms in computer network [J]. International Journal of Network Security,2012,14(3) : 149-155. 被引量:1
  • 10Li Hong, Qian Chang-j i, Sun Li-zhen, et al. Simulation of a flexi- ble polymer tethered to a flat adsorbing surface [J]. Journal of Applied Polymer Science, 2012,124 : 282-287. 被引量:1

共引文献60

同被引文献53

引证文献14

二级引证文献30

投稿分析

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部 意见反馈