2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2017
DOI: 10.1109/itnec.2017.8285064
|View full text |Cite
|
Sign up to set email alerts
|

Research on network security protection system based on dynamic modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Currently, there is active international research in this direction, most of which is supported by the US Department of Defense Advanced Programs and the National Science Foundation. At the initial stage, intensive research in data mining-based intrusion detection has been conducted by Wenke Lee's group at Columbia University [17,18] and Stephanie Forrest's group at University or New Mexi (UNM). The data mining-based audit analysis system implemented by Wenke Lee's group is significantly better than other systems in detecting denial-of-service attacks and scanning, but not enough research has been done to detect anomalous internal user actions [19].…”
Section: Current Developments In Audit Technologymentioning
confidence: 99%
“…Currently, there is active international research in this direction, most of which is supported by the US Department of Defense Advanced Programs and the National Science Foundation. At the initial stage, intensive research in data mining-based intrusion detection has been conducted by Wenke Lee's group at Columbia University [17,18] and Stephanie Forrest's group at University or New Mexi (UNM). The data mining-based audit analysis system implemented by Wenke Lee's group is significantly better than other systems in detecting denial-of-service attacks and scanning, but not enough research has been done to detect anomalous internal user actions [19].…”
Section: Current Developments In Audit Technologymentioning
confidence: 99%
“…Xi et al [4] proposed an improved quantitative evaluation model of the network security situation and optimized the network security situation quantitative value by game method, but the information source is single. Shu et al [5] proposed a network security risk assess-ment model based on network security vulnerabilities to assess network security risks. However, the model requires a large amount of data, the risk baseline determination is influenced by experts, and the algorithm complexity is high.…”
Section: Introductionmentioning
confidence: 99%