全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

面向网络安全的数据融合技术研究
Research on Technologies of Data Fusion for Network Security

DOI: 10.12677/SEA.2021.102017, PP. 149-155

Keywords: 网络安全,数据融合,数据治理,数据挖掘,人工智能
Network Security
, Data Fusion, Data Governance, Data Mining, Artificial Intelligence

Full-Text   Cite this paper   Add to My Lib

Abstract:

网络安全保护工作需要对各类多源异构的网络安全数据进行融合分析,以提炼知识线索,发现数据内容之间的互补关系、隐含关系和关联关系,从而支撑网络安全监测发现、分析研判和处置应对等工作内容。本文从融合对象、融合目标和融合方法入手,提出了网络安全数据融合要素,重点阐述了基于统计学、数据挖掘和人工智能的数据融合方法,并对其应用于网络安全领域的适用性进行了探讨。
Network security protection requires the fusion and analysis of all kinds of multi-source and het-erogeneous data, so as to extract knowledge clues and discover the implicit correlation relationship between data items, and furthermore, to support the duties of security monitoring, research and judgement, disposal and response. Starting with objects, targets and methods of data fusion, this paper puts forward the elements of network security data fusion, focuses on the data fusion methods based on statistics, data mining and artificial intelligence, and discusses the applicability in the field of network security.

References

[1]  Lou, R.C. and Key, M.G. (1989) Multisensor Integration and Fusion in Intelligent System. IEEE Transactions on Sys-tems Man and Cybernetics, 19, 901-903.
https://doi.org/10.1109/21.44007
[2]  Barnum, S. (2020) STIX-Whitepaper. http://stixproject.github.io/getting-started/whitepaper/
[3]  Rao, C.R. (1973) Linear Statistical In-ference and Its Applications. John Wiley & Sons, Inc., New York.
https://doi.org/10.1002/9780470316436
[4]  Kalman, R.E. (1960) A New Approach to Linear Filtering and Pre-diction Problems. Transactions of the ASME, Journal of Basic Engineering, 82, 35-45.
https://doi.org/10.1115/1.3662552
[5]  Gonzalez, R.C. and Woods, R.E. (2002) Digital Image Processing. Ad-dision-Wesley, Boston.
[6]  Chan, V. (2013) Theory and Applications of Monte Carlo Simulations. Intech, Rijeka.
https://doi.org/10.5772/45892
[7]  Chen, M., Han, J. and Yu, P. (1996) Data Mining: An Overview from Database Perspective. IEEE Transactions on Knowledge and Data Engineering, 8, 866-883.
https://doi.org/10.1109/69.553155
[8]  Han, J.W. and Kamber, M. (2000) Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers.
[9]  Lecun, Y. and Bottou, L. (1998) Gradient-Based Learning Applied to Document Recognition. Proceedings of the IEEE, 86, 2278-2324.
https://doi.org/10.1109/5.726791
[10]  Rumelhart, D.E., Hinton, G.E. and Williams, R.J. (1986) Learning Representations by Back Propagating Errors. Nature, 323, 533-536.
https://doi.org/10.1038/323533a0
[11]  Hochreiter, S. and Schmidhuber, J. (1997) Long Short-Term Memory. Neural Computation, 9, 1735-1780.
https://doi.org/10.1162/neco.1997.9.8.1735

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133