{"title":"Security Situation Assessment Based on the DS Theory","authors":"Feng Xuewei, Wang Dongxia, Ma Guoqing, Li Jin","doi":"10.1109/ETCS.2010.63","DOIUrl":null,"url":null,"abstract":"A security situation assessment model is proposed in this paper. One of the math function and the rectification function are used to design the experience function in the theory of evidence. Then the theory of evidence is brought into the security situation assessment. From correlating and fusing the data which is provided by the sensors deployed in network to depicting the curve of security situation, we complete the whole process. We also verified the security situation assessment model and the algorithm, the results show that the problem of network security situation assessment is resolved very well by the use of the theory of evidence. At last the method of how to apply this assessment model to large-scale network security situation assessment is introduced in this paper.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Workshop on Education Technology and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETCS.2010.63","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
A security situation assessment model is proposed in this paper. One of the math function and the rectification function are used to design the experience function in the theory of evidence. Then the theory of evidence is brought into the security situation assessment. From correlating and fusing the data which is provided by the sensors deployed in network to depicting the curve of security situation, we complete the whole process. We also verified the security situation assessment model and the algorithm, the results show that the problem of network security situation assessment is resolved very well by the use of the theory of evidence. At last the method of how to apply this assessment model to large-scale network security situation assessment is introduced in this paper.