Research of D-S Evidence Method in Network Attack Intention Recognition
Authors
Yajing Zhang, Lina Yu, Wei Li
Corresponding Author
Yajing Zhang
Available Online September 2012.
- DOI
- 10.2991/emeit.2012.516How to use a DOI?
- Keywords
- D-S evidence method, network attack, intention recognition
- Abstract
When the network security threats alarm as evidence appeared, from these alarm properties were then able to predict the future attack important information, such as attack source, is the object of attack and attack port, etc. But the information is not enough to reflect the invaders attack intention. This paper puts forward a kind of attack intention recognition called D-S evidence theory method.
- Copyright
- © 2012, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Yajing Zhang AU - Lina Yu AU - Wei Li PY - 2012/09 DA - 2012/09 TI - Research of D-S Evidence Method in Network Attack Intention Recognition BT - Proceedings of the 2nd International Conference on Electronic & Mechanical Engineering and Information Technology (EMEIT 2012) PB - Atlantis Press SP - 2325 EP - 2328 SN - 1951-6851 UR - https://doi.org/10.2991/emeit.2012.516 DO - 10.2991/emeit.2012.516 ID - Zhang2012/09 ER -