期刊文献+

基于多元线性回归预测模型的sensor态势研究 被引量:6

Research of Sensor Situation Based on Multiple Linear Regression Forecast Model
在线阅读 下载PDF
导出
摘要 由于系统漏洞层出不穷,网络管理员也不容易获得用户主机的安全态势,如何在攻击者利用漏洞之前,对网络中用户主机的漏洞、脆弱性进行自动发现成为保障计算机网络安全、平稳运行的关键问题。文中针对多元线性回归预测模型算法,首先利用最小二乘法实现对多元线性回归方程的求解,然后利用"t-检验"检验回归系数的显著性,实现对sensor安全的精确预测,使网络管理员能直观了解到sensor的全状况,以寻求最低的事故率、最少的损失和最优的安全投资效益。 Due to system vulnerability emerging in endlessly,and administrators of network acquiring security situation of customer host not easily also,how to automatically discover the vulnerability and frangibility of customer host on the internet before attackers utilize the vulnerability becomes a sixty-four-dollar question of ensuring the network run surely and placidly.In allusion to the algorithms of multiple linear regression forecast model,realize the forecast of sensor security exactly utiliz the least square to solve the equation of multiple linear regression firstly,and then utilize t-test to test the significance of regression coefficient.Thus administrators of network are able to know the whole status of sensor intuitively,and seek the lowest accident rate,the least loss,and the best security investment re-sults.
出处 《计算机技术与发展》 2011年第9期229-232,共4页 Computer Technology and Development
关键词 漏洞 安全态势 多元线性回归预测模型 最小二乘法 t-检验 vulnerability security situation multiple linear regression forecast model least square t-test
  • 相关文献

参考文献12

  • 1Askola K, Puupera R., Pietikainen P,etal. Vulnerability Dependencies in Antivirus Software [ C ]//Proc. of the Second International Conference on Emerging Security Information, Systems and Technologies. Cap Esterel, France : [ s. n. ] , 2008 : 273 -278.
  • 2Zhang C C, Winslctt M, Gunter C A. On the Safety and Efficiency of Firewall PoJicy Deployment [ C ]//2007 IEEE Sym posium on Security and Privacy. Oakland, California: [ s n. ] ,2007:33-50.
  • 3Chen l:lao.Clark J A,Shaikh S A,et al. Optimising IDS Sensor Placement[ C ]//2010 International Conference on Availa- bility, Reliability and Security. Krakow, Poland: [ s. n. ], 2010:315-320.
  • 4Deng Chao, Yan Danfeng, Yang Yun,et al. A Domain-oriented Distributed Vulnerability Scanning Mechanism [ C ]//2nd IEEE International Conference on Broadband Network & Multimedia Technology. Beijing: [ s. n. ] ,2009:831-836.
  • 5陆余良,夏阳.主机安全量化融合模型研究[J].计算机学报,2005,28(5):914-920. 被引量:29
  • 6毛欣欣,许榕生,丁天昌.一种基于CVSS的网络脆弱性评估系统[J].电子技术(上海),2009,36(1):59-61. 被引量:4
  • 7汪贵生,夏阳.基于Rough集理论的主机安全评估模型研究[J].计算机技术与发展,2008,18(12):156-158. 被引量:1
  • 8王慧强,赖积保,朱亮,梁颖.网络态势感知系统研究综述[J].计算机科学,2006,33(10):5-10. 被引量:127
  • 9邹乐强.最小二乘法原理及其简单应用[J].科技信息,2010(23):282-283. 被引量:127
  • 10MSTL-JGF-04-0160101-2006,信息安全技术主机安全漏洞扫描产品检验规范[S].2006.

二级参考文献72

共引文献293

同被引文献94

引证文献6

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部