2019
DOI: 10.1186/s13638-019-1506-1
|View full text |Cite
|
Sign up to set email alerts
|

Analysis framework of network security situational awareness and comparison of implementation methods

Abstract: Information technology has penetrated into all aspects of politics, economy, and culture of the whole society. The information revolution has changed the way of communication all over the world, promoted the giant development of human society, and also drawn unprecedented attention to network security issues. Studies, focusing on network security, have experienced four main stages: idealized design for ensuring security, auxiliary examination and passive defense, active analysis and strategy formulation, and o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 45 publications
(22 citation statements)
references
References 109 publications
(231 reference statements)
0
18
0
1
Order By: Relevance
“…The Internet of things comes from pervasive computing, which was proposed in 1991. It is generally believed that pervasive computing should be that computers exist anywhere in the physical world, but users do not know that these computers are providing them with various services [14,15]. Then in 1994, situational awareness was defined as a computer system with adaptive responses to the surrounding environment, illustrating the importance of the surrounding environment.…”
Section: Research Status Of Situational Awarenessmentioning
confidence: 99%
“…The Internet of things comes from pervasive computing, which was proposed in 1991. It is generally believed that pervasive computing should be that computers exist anywhere in the physical world, but users do not know that these computers are providing them with various services [14,15]. Then in 1994, situational awareness was defined as a computer system with adaptive responses to the surrounding environment, illustrating the importance of the surrounding environment.…”
Section: Research Status Of Situational Awarenessmentioning
confidence: 99%
“…According to Li et a. (2019), integrating multilayered security in a network system makes it possible for network managers to identify and isolate any threat or possible attacks before they spread.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Actually, abnormal behaviors are the activities inside a system which are opposite of the normal or logistic behaviors. Thus, the core of anomaly detection is established based on the monitoring of normal system operation to find out any deviation from the normal model [98].…”
Section: F Anomaly Detectionmentioning
confidence: 99%