Research of Network Security Situation Prediction Based on Kalman Algorithm

Article Preview

Abstract:

At present the awareness model of network security situation can only analysis the network security situation of past or current time. The lack of research on this field will affect the security of network. A method based on Kalman algorithm is proposed in this paper, which can forecast the network security situation by using the current and past security situation values. The simulation results show that the proposed algorithm can not only reflect the overall trend of network security situation but also forecast the trend of value effectively. Compared with the traditional GM(1,1), the method has a more predictive value; Compared with RBF algorithm, the method is more applicable to the real network environment.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

714-719

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Coates, G.M., Hopkinson, K.M., Graham, S.R. et al. A Trust System Architecture for SCADA Network Security[J]. IEEE Transactions on Power Delivery, 2010, 25(1): 158-169.

DOI: 10.1109/tpwrd.2009.2034830

Google Scholar

[2] Tague, P., Slater, D., Rogers, J. et al. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis[J]. IEEE transactions on dependable and secure computing, 2009, 6(2): 111-123.

DOI: 10.1109/tdsc.2008.60

Google Scholar

[3] Hayes, Adrian. Network Service Authentication Timing Attacks[J]. IEEE security & amp; privacy, 2013, 11(2): 80-82.

DOI: 10.1109/msp.2013.39

Google Scholar

[4] JING DONG, REZA CURTMOLA, CRISTINA NITA-ROTARU et al. Practical Defenses Against Pollution Attacks in Wireless Network Coding[J]. ACM transactions on information and system security, 2011, 14(1): 133-163.

DOI: 10.1145/1952982.1952989

Google Scholar

[5] Lelarge, Marc. Coordination in Network Security Games: A Monotone Comparative Statics Approach[J]. IEEE Journal on Selected Areas in Communications, 2012, 30(11): 2210-2219.

DOI: 10.1109/jsac.2012.121213

Google Scholar