Proceedings of the 2nd International Conference on Electronic & Mechanical Engineering and Information Technology (EMEIT 2012)

Research of D-S Evidence Method in Network Attack Intention Recognition

Authors
Yajing Zhang, Lina Yu, Wei Li
Corresponding Author
Yajing Zhang
Available Online September 2012.
DOI
10.2991/emeit.2012.516How to use a DOI?
Keywords
D-S evidence method, network attack, intention recognition
Abstract

When the network security threats alarm as evidence appeared, from these alarm properties were then able to predict the future attack important information, such as attack source, is the object of attack and attack port, etc. But the information is not enough to reflect the invaders attack intention. This paper puts forward a kind of attack intention recognition called D-S evidence theory method.

Copyright
© 2012, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Conference on Electronic & Mechanical Engineering and Information Technology (EMEIT 2012)
Series
Advances in Intelligent Systems Research
Publication Date
September 2012
ISBN
978-90-78677-60-4
ISSN
1951-6851
DOI
10.2991/emeit.2012.516How to use a DOI?
Copyright
© 2012, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Yajing Zhang
AU  - Lina Yu
AU  - Wei Li
PY  - 2012/09
DA  - 2012/09
TI  - Research of D-S Evidence Method in Network Attack Intention Recognition
BT  - Proceedings of the 2nd International Conference on Electronic & Mechanical Engineering and Information Technology (EMEIT 2012)
PB  - Atlantis Press
SP  - 2325
EP  - 2328
SN  - 1951-6851
UR  - https://doi.org/10.2991/emeit.2012.516
DO  - 10.2991/emeit.2012.516
ID  - Zhang2012/09
ER  -