{"title":"Vulnerability Data Fusion Method Based on the D-S theory of Evidence","authors":"Zhong Qiuxi, Zhao Zhengye","doi":"10.1109/IMCCC.2012.178","DOIUrl":null,"url":null,"abstract":"A fusion algorithm for network security situational awareness is proposed based on D-S theory of evidence, processing the vulnerability data from network scanning and host scanning. Though normalizing the vulnerability data, we constructed the corresponding basic probability assignment and fusion the data, fully used the redundancy and complementarity of multisource data, and integrated the results got by different scanning means. The results showed that this method obtained more comprehensive and reliable results.","PeriodicalId":394548,"journal":{"name":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMCCC.2012.178","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
A fusion algorithm for network security situational awareness is proposed based on D-S theory of evidence, processing the vulnerability data from network scanning and host scanning. Though normalizing the vulnerability data, we constructed the corresponding basic probability assignment and fusion the data, fully used the redundancy and complementarity of multisource data, and integrated the results got by different scanning means. The results showed that this method obtained more comprehensive and reliable results.