%0 Journal Article %T Research on methods of network risk evaluation
网络风险评估方法研究 %A SHI Zhi-cai %A
史志才 %J 计算机应用 %D 2008 %I %X In order to evaluate the network risk, Hidden Markov random procedure was adopted as analysis means. The output of intrusion detection systems (called alarm events) was used as the processed objects. The Hidden Markov Model (HMM) to describe the state transform of the attacked host system was constructed. The calculation method of the risk coefficient for host systems was given. The risk coefficients for host systems were simply added to obtain the quantitive evaluation of the risk for whole network. The experiments justify that the proposed method is effective. %K network security %K Hidden Markov Model (HMM) %K risk evaluation
网络安全 %K 隐马尔可夫模型 %K 风险评估 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=831E194C147C78FAAFCC50BC7ADD1732&aid=5BDD966B9B957E75D773D538D5AB1103&yid=67289AFF6305E306&vid=D3E34374A0D77D7F&iid=F3090AE9B60B7ED1&sid=1A8F03B3AE9FEF6F&eid=649A991C7D72F1EF&journal_id=1001-9081&journal_name=计算机应用&referenced_num=5&reference_num=6