{"title":"基于DS理论的安全态势评估","authors":"Feng Xuewei, Wang Dongxia, Ma Guoqing, Li Jin","doi":"10.1109/ETCS.2010.63","DOIUrl":null,"url":null,"abstract":"A security situation assessment model is proposed in this paper. One of the math function and the rectification function are used to design the experience function in the theory of evidence. Then the theory of evidence is brought into the security situation assessment. From correlating and fusing the data which is provided by the sensors deployed in network to depicting the curve of security situation, we complete the whole process. We also verified the security situation assessment model and the algorithm, the results show that the problem of network security situation assessment is resolved very well by the use of the theory of evidence. At last the method of how to apply this assessment model to large-scale network security situation assessment is introduced in this paper.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security Situation Assessment Based on the DS Theory\",\"authors\":\"Feng Xuewei, Wang Dongxia, Ma Guoqing, Li Jin\",\"doi\":\"10.1109/ETCS.2010.63\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A security situation assessment model is proposed in this paper. One of the math function and the rectification function are used to design the experience function in the theory of evidence. Then the theory of evidence is brought into the security situation assessment. From correlating and fusing the data which is provided by the sensors deployed in network to depicting the curve of security situation, we complete the whole process. We also verified the security situation assessment model and the algorithm, the results show that the problem of network security situation assessment is resolved very well by the use of the theory of evidence. At last the method of how to apply this assessment model to large-scale network security situation assessment is introduced in this paper.\",\"PeriodicalId\":193276,\"journal\":{\"name\":\"2010 Second International Workshop on Education Technology and Computer Science\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-03-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Workshop on Education Technology and Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ETCS.2010.63\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Workshop on Education Technology and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETCS.2010.63","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Situation Assessment Based on the DS Theory
A security situation assessment model is proposed in this paper. One of the math function and the rectification function are used to design the experience function in the theory of evidence. Then the theory of evidence is brought into the security situation assessment. From correlating and fusing the data which is provided by the sensors deployed in network to depicting the curve of security situation, we complete the whole process. We also verified the security situation assessment model and the algorithm, the results show that the problem of network security situation assessment is resolved very well by the use of the theory of evidence. At last the method of how to apply this assessment model to large-scale network security situation assessment is introduced in this paper.