Research on Sequential Optimized Method of Network Security Alarms Based on Users Feedback

Peihua Su

Abstract


As for the doubts about the most serious network security alarms presented by users, a method of modifying evaluation parameters based on user’s feedback about network security alarms has been proposed. In case a preference is set in system-initialization and top-k technology is used to acquire k alarms that users think are the most serious among network security alarms. As for user’ similar doubts, this paper provides a method of modifying evaluation parameters based on user’s feedback. This method obtains candidate weights by sampling from subspace of weight to redefine a new query. At first, it defines the assessment model function which can be used to measure changes of initialized top-k query. Then based on this, a further fine-grained depiction is carried out for sampling the space of the sampling to make sampling space more precise. At last, in given candidate weight, the new optimal query can be gained from processing the incremental top-k algorithm. In this process, the assessment model function is used to make a further optimization for the terminal conditions of the incremental top-k algorithm. It is needed to terminate top-k query which can not be used to acquire the optimal solution as early as possible, which greatly improves the efficiency to execute the algorithm. The results of this experiment shows that the algorithm proposed in this paper has a better execution efficiency


Full Text:

PDF

References


Adam E. (1993). Fighter cockpits of the future [C]. In Proceeding of the 12th Digital Avionics Systems Conference, 25(28), 318-323.

Bass T. (1999). Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems [C]. In Proceedings of the IRIS National Symposium on Sensor and Data Fusion, 24(28), 24-27.

Blasch E., Plano S. (2002). User refinement issues and applications in group tracking [J]. Proceedings of SPIE, 47(29), 103-109.

Blasch E., Plano S. (2005). DFIG Level 5 (User Refinement) issues supporting Situational Assessment Reasoning [C]. In Proceedings of the 8th International Conference on Information Fusion, 12(3), 25-29.

Boyd J. (1996). The essence of winning and losing [J]. Unpublished lecture notes. 12(23), 123-125.

Dasarathy B. (1997). Sensor fusion potential exploitation-innovative architectures and illustrative applications [J]. Proceedings of the IEEE, 85(1), 24-38.

Fan S.G., Zhang S. (2001). Critical Infrastructure Protection in the Information Age [J]. Executive Order, 13(23), 114-119.

Farn K., Lin S. (2004). Study on information security management system evaluation-assets, threat and vulnerability [J]. Computer Standards & Interfaces, 26(6), 501-513.

Giacobe N. (2010). Application of the JDL data fusion process model for cyber security [C]. In SPIE Defense, Security, and Sensing, 21(13), 231-235.

Hall D., Llinas J. (1997). An introduction to multisensor data fusion [J]. Proceedings of the IEEE, 85(1), 6-23.

Kadar I. (2005). Knowledge representation issues in perceptual reasoning managed situation assessment [C]. In Proceedings of the 8th International Conference on Information Fusion, 42(12), 25-29.

Luker M. (2003). The National Strategy to Secure Cyberspace [J]. Educause Review, 38(1), 60-69.

McNab C. (2007). Network security assessment [M]. O’Reilly Media, 8(12), 236-241.

Mlica M. (2007). Technology foresight on data fusion and data processing [J]. Journal of The Royal A eronautical Social, 12(3), 36-39.

Porras P. (2009). Inside risks Reflections on Conficker [J]. Communications of the ACM. 52(10), 23-24.

Salerno J. (2002). Information fusion: a high-level architecture overview [C]. In Proceedings of the 5th International Conference on Information Fusion, 8(11), 680-686.

Shahbazian E. (2001). Blodgett Done. The extended OODA model for data fusion systems [C]. In Proceedings of the 4th International Conference on Information Fusion, 12(3), 19-25.

Shulsky A., Schmitt G. (2002), Silent warfare: understanding the world of intelligence [M]. Potomac Books Incorporated, 42(2), 203-206.


Refbacks

  • There are currently no refbacks.


Revista de la Facultad de Ingeniería,

ISSN: 2443-4477; ISSN-L:0798-4065

Edif. del Decanato de la Facultad de Ingeniería,

3º piso, Ciudad Universitaria,

Apartado 50.361, Caracas 1050-A,

Venezuela.

© Universidad Central de Venezuela