[1]Wei Yong,Lian Yifeng,Feng Dengguo.A network security situational awareness model based on information fusion[J].Journal of Computer Research and Development,2009,46(3):353362.(in Chinese)
[2]Jajodia S, Noel S, O’Berry B. Topological analysis of network attack vulnerability [M]∥Kumar V,Srivastava J,Lazarevic A.Managing Cyber Threats:Issues,Approaches and Challenges.Dordrecht:Kluwer Academic Publisher,2005:247266.
[3]Wang Lingyu,Singhal A,Jajodia S.Measuring network security using attack graphs[C]∥Proc of the 2007 ACM Workshop on Quality of Protection,2007:4954.
[4]Wang Lingyu,Singhal A,Jajodia S.Measuring the overall security of network configurations using attack graphs[C]∥Proc of the 21st IFIP WG 11.3 Working Conference on Data and Applications Security,2007:98112.
[5]Ning Peng,Cui Yun,Reeves D S,et al.Techniques and tools for analyzing intrusion alerts[J].ACM Transactions on Information and System Security,2004,7( 2):274318.
[6]Xu Dingbang,Ning Peng.Alert correlation though trigger event and common resource [C]∥Proc of the 20th Annual Computer Security Applications Conference,2004:360369.
[7]Barford P, Chen Yan, Goyal A, et al. Employing honeynets for network situational awareness[C]∥Proc of the 4th Workshop on Hot Topics in Networks,2005:71102.
[8]Thonnard O,Dacier M.A framework for attack patterns’ discovery in honeynet data [C]∥Proc of the 8th Digital Forensics Research Conference,2008:S128S139.
[9]Wang Juan,Zhang Fengli,Fu Chong,et al,Study on index system in network situation awareness[J].Computer Applications,2007,27(8):19071909.(in Chinese)
[10]Cheng Wenchong,Zou Peng,Jia Yan,A network security situation awareness model based on stream cube[J].Computer Engineering & Science,2011,33(8):813.(in Chinese)
[11]Wang Zhiping,Jia Yan,Li Aiping,et al.Quantitative assensent method of network situation based on fuzzy analytical hierarchy process[J].Computer Security,2011(1):6165.(in Chinese)
[12]Zhang Yongjun,Tang Jun.Analysis and assessment of network security situation based on cloud model,[J].Computer Engineering & Science,2014,36(1):6367.(in Chinese)
[13]Su Weihua.Research questions of multiple objective comprehensive evaluation methods and theories [D].Xiamen:Xiamen University,2000.(in Chinese)
[14]Chen Liuwei.Algorithm design of situation assessment oriented to network security situation assessment system[D].Harbin:Harbin Engineering University,2011.(in Chinese)
[15]General Administration of Quality Supervision Inspection and Quarantine fo the People’s Republic of China, Standardization Administration of the
People’s Republic of China.
Information security technologyGuidelines for the category and classification of information security incidents:GB/Z 20986—2007[S].Beijing:Standards Press of China,
20070614.(in Chinese)
[16]
General Administration of Quality Supervision Inspection and Quarantine fo the People’s Republic of China, Standardization Administration of the
People’s Republic of China.
Information security technologyGuidelines for classification of security vulnerability classification:GB/T 302792013[S].
Beijing:Standards Press of China,
20070715.(in Chinese)
[17]Zhang Jijun. Fuzzy analytical hierarchy process(FAHP)[J].Fuzzy Systems and Mathematics,2000,14(2):8088.(in Chinese)
[18]Jiang Yangping,Fan Zhiping.A new method for regulating the consistency of fuzzy judgement matrix[J].Mathematics in Practice and Theory,2003,33(12):8287.(in Chinese)
[19]Jiang Yangping,Fan Zhiping.A new method for improving the consistency of fuzzy judgement matrix[J].Fuzzy Systems and Mathematics,2002,16(2):7478.(in Chinese)
[20]Song Guangxing, Yang Deli. Methods for identifying and improving the consistency of fuzzy judgment matrix[J].Systems Engineering,2003,21(1):110116.(in Chinese)
[21]Gao Yang,Wang Gang,Xia Jie.New algorithm of metasynthesis based on artificial neural network[J].Systems Engineering and Electronics,2004,12:18211825.(in Chinese)
[22]
General Administration of Quality Supervision Inspection and Quarantine fo the People’s Republic of China, Standardization Administration of the
People’s Republic of China.
Information security technology classification guide for classified protection of information system:GB 178591999[S].
Beijing:Standards Press of China,20080619.
(in Chinese)
附中文参考文献:
[1]韦勇,连一峰,冯登国.基于信息融合的网络安全态势评估模型[J].计算机研究与发展,2009,46(3):353362.
[9]王娟,张凤荔,傅翀,等.网络态势感知中的指标体系研究[J].计算机应用,2007,27(8):19071909.
[10]程文聪,邹鹏,贾焰.一种基于流立方体的网络安全态势感知模型[J].计算机工程与科学,2011,33(8):813.
[11]王志平,贾焰,李爱平,等.基于模糊层次法的网络态势量化评估方法[J].计算机安全,2011(1):6165.
[12]张拥军,唐俊.基于云模型的网络安全态势分析与评估[J].计算机工程与科学,2014,36(1):6367.
[13]苏为华.多指标综合评价理论与方法问题研究[D].厦门:厦门大学,2000.
[14]陈柳巍.面向网络安全态势评估系统的态势评估算法设计[D].哈尔滨:哈尔滨工程大学,2011.
[15]中华人民共和国国家质量监督检验检疫总局,中国国家标准化管理委员会.
信息安全技术 信息安全事件分类分级指南:GB/Z 20986—2007[S].北京:中国标准出版社,20070614.
[16]
中华人民共和国国家质量监督检验检疫总局,中国国家标准化管理委员会.
信息安全技术 安全漏洞等级划分指南:GB/T 302792013[S].北京:中国标准出版社,20040715.
[17]张吉军.模糊层次分析法(FAHP)[J].模糊系统与数学,2000,14(2):8088.
[18]姜艳萍,樊治平.模糊判断矩阵一致性的调整方法[J].数学的实践与认识,2003,33(12):8287.
[19]姜艳萍,樊治平.一种校正模糊判断矩阵一致性的新方法[J].模糊系统与数学,2002,16(2):7478.
[20]宋光兴,杨德礼.模糊判断矩阵的一致性检验及一致性改进方法[J].系统工程,2003,21(1):110116.
[21]高阳,王刚,夏洁.一种新的基于人工神经网络的综合集成算法[J].系统工程与电子技术,2004,12:18211825.
[22]
中华人民共和国国家质量监督检验检疫总局,中国国家标准化管理委员会.
信息安全技术信息系统安全等级保护定级指南:GB 178591999[S].
北京:中国标准出版社,20080619.
|