Association of Attack Factors Based on Fuzzy Information Fusion
Facing the current increasingly serious network security situation, one model of networked system security situation evaluation and definition of attack factors was presented based on the problems. Then, attack frequency, attack difficult degree and attack compromise degree were quantized in dynamic method. It made to indicate the success number, probability of success and the extent of harm more precisely. In view of the uncertainty, un-integrity fuzzy and changeability of the attack information, this thesis put forward a method of fuzzy information fusion which was based on Mamdani fuzzy reasoning method to realize the association of attack factors. Then, this thesis used Matlab 7.0 simulating tool to conduct the experiment. The experiment showed that the method raised in this thesis really reflected the security situation format.
Unable to display preview. Download preview PDF.
- 1.Y. Zhang, Y. J. Zhang, H. T. Chen. “A New Method of Defining Network Attack Severity,” Computer Engineering, 2002 28(8): pp. 33–34.Google Scholar
- 2.L. Wang, H. K. Yu, H. Xie, “Model of evaluating severity of network attack on concrete computer,” Computer Engineering and Design, vol. 26(6): pp.1519–1521, July 2005.Google Scholar
- 3.Y. L. Zheng, D. L. Huang, J. Guo, “Mamdani algorithm of fuzzy reasoning,” Journal of Baoji College of Arts and Science (Natural Science Edition), vol. 21(3): pp.168–173, April 2001.Google Scholar
- 4.S. T. Lou, C. H. Hu, W. Zhang, “Fuzzy System Analysis and Design Based on MATLAB,” Xidian University Press, vol. 2001(5). pp. 235–239.Google Scholar
- 5.Honeynet Project. Scan 17, http://www.honeynet.org/ scans/scan17, 2002.
- 6.N. Sun, The Design of Situation Evaluation on Networked System Security and Research of Situation Fusion Model, M. E., Lanzhou University of Technology, 2007.Google Scholar
- 7.J. Z. Jiao, Y. W. Xie, Z. Y. Ma and J. Y. Shi, “Construction of National Earthen Site Information System Database by GIS, ” WMAMH 2007, pp.427–431.Google Scholar
- 8.S. Kumer, “Classification and Detection of Computer Intrusions,” Ph.D. Thesis, Purdue University, WestLafayette, Indiana, Aug. 1995.Google Scholar