|
面向网络安全的数据融合技术研究
|
Abstract:
网络安全保护工作需要对各类多源异构的网络安全数据进行融合分析,以提炼知识线索,发现数据内容之间的互补关系、隐含关系和关联关系,从而支撑网络安全监测发现、分析研判和处置应对等工作内容。本文从融合对象、融合目标和融合方法入手,提出了网络安全数据融合要素,重点阐述了基于统计学、数据挖掘和人工智能的数据融合方法,并对其应用于网络安全领域的适用性进行了探讨。
Network security protection requires the fusion and analysis of all kinds of multi-source and het-erogeneous data, so as to extract knowledge clues and discover the implicit correlation relationship between data items, and furthermore, to support the duties of security monitoring, research and judgement, disposal and response. Starting with objects, targets and methods of data fusion, this paper puts forward the elements of network security data fusion, focuses on the data fusion methods based on statistics, data mining and artificial intelligence, and discusses the applicability in the field of network security.
[1] | Lou, R.C. and Key, M.G. (1989) Multisensor Integration and Fusion in Intelligent System. IEEE Transactions on Sys-tems Man and Cybernetics, 19, 901-903. https://doi.org/10.1109/21.44007 |
[2] | Barnum, S. (2020) STIX-Whitepaper. http://stixproject.github.io/getting-started/whitepaper/ |
[3] | Rao, C.R. (1973) Linear Statistical In-ference and Its Applications. John Wiley & Sons, Inc., New York.
https://doi.org/10.1002/9780470316436 |
[4] | Kalman, R.E. (1960) A New Approach to Linear Filtering and Pre-diction Problems. Transactions of the ASME, Journal of Basic Engineering, 82, 35-45. https://doi.org/10.1115/1.3662552 |
[5] | Gonzalez, R.C. and Woods, R.E. (2002) Digital Image Processing. Ad-dision-Wesley, Boston. |
[6] | Chan, V. (2013) Theory and Applications of Monte Carlo Simulations. Intech, Rijeka. https://doi.org/10.5772/45892 |
[7] | Chen, M., Han, J. and Yu, P. (1996) Data Mining: An Overview from Database Perspective. IEEE Transactions on Knowledge and Data Engineering, 8, 866-883. https://doi.org/10.1109/69.553155 |
[8] | Han, J.W. and Kamber, M. (2000) Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers. |
[9] | Lecun, Y. and Bottou, L. (1998) Gradient-Based Learning Applied to Document Recognition. Proceedings of the IEEE, 86, 2278-2324. https://doi.org/10.1109/5.726791 |
[10] | Rumelhart, D.E., Hinton, G.E. and Williams, R.J. (1986) Learning Representations by Back Propagating Errors. Nature, 323, 533-536. https://doi.org/10.1038/323533a0 |
[11] | Hochreiter, S. and Schmidhuber, J. (1997) Long Short-Term Memory. Neural Computation, 9, 1735-1780.
https://doi.org/10.1162/neco.1997.9.8.1735 |