scispace - formally typeset
Proceedings ArticleDOI

Network security risk assessment based on support vector machine

Jun Chen, +1 more
- pp 184-187
Reads0
Chats0
TLDR
The content and the evaluation indicators of network security risk assessment and the classification of the support vector machine are described and the method is proposed, which is feasible and effective.
Abstract
With the development and application of network technology, the issues of network security has become prominent increasingly. Network security risk assessment has become the key process in solve network security. Support Vector Machine(SVM)is one of novel learning machine methods, its advantages are simple structure, strong compatibility, global optimization, least raining time and better generalization. So it has superiority to apply it into network security risk assessment. This paper describes the content and the evaluation indicators of network security risk assessment and the classification of the support vector machine in detail. And then an assessment method of network security risk based on support vector machine is proposed in this paper. Experiment results show that the method Is feasible and effective.

read more

Citations
More filters
Journal ArticleDOI

Comprehensive approach to information sharing for increased network security and survivability

TL;DR: A comprehensive approach to information sharing framework aimed at increasing network security and survivability is presented and developments and results of information sharing mechanisms in both on-line and off-line network security dimensions are described.
Proceedings ArticleDOI

The Research of the Network Security Situation Prediction Mechanism Based on the Complex Network

TL;DR: Through simulation analysis, the network security situation prediction mechanism based on the complex network can reflect the essence behavior of the system to some extent and can precisely predict the Security Status in thecomplex network.
Journal ArticleDOI

Network security situation automatic prediction model based on accumulative CMA-ES optimization

TL;DR: The proposed security situation automatic prediction model based on accumulative data preprocess and support vector machine (SVM) optimized by covariance matrix adaptive evolutionary strategy (CMA-ES) has faster convergence-speed and higher prediction accuracy than other extant prediction models.
Proceedings ArticleDOI

S. A. V. I. O. R: Security Analytics on Asset Vulnerability for Information Abstraction and Risk Analysis

TL;DR: This paper proposes an architecture that will enable a company to perform a proactive risk assessment of their network to mitigate any possible chance of data leaks or damage to the network and uses machine learning mechanisms to perform abstraction of performance metrics gained from a data provider, Nexpose, while also performing an analysis of assets in terms of one area of risk, vulnerability.
Proceedings ArticleDOI

Research on Risk Assessment Technology of Power Monitoring System Based on Machine Learning

TL;DR: After establishment and operation of the model, effective and rapid analysis and output of disposal recommendations and corresponding risk levels are carried out, and the original experience is intellectualized and rationalized to the relevant people.
References
More filters
Journal ArticleDOI

Comparing support vector machines with Gaussian kernels to radial basis function classifiers

TL;DR: The results show that on the United States postal service database of handwritten digits, the SV machine achieves the highest recognition accuracy, followed by the hybrid system, and the SV approach is thus not only theoretically well-founded but also superior in a practical application.
Book ChapterDOI

Chapter 2 – nonnegative matrices

TL;DR: In this paper, the two basic approaches to the study of nonnegative matrices are geometrical and combinatorial, using the elementwise structure in which the zero-nonzero pattern plays an important role.
Journal ArticleDOI

Improving the modified Gauss-Seidel method for Z-matrices

TL;DR: This paper uses the preconditioning matrix I + S(α) to show that if a coefficient matrix A is an irreducibly diagonally dominant Z-matrix, then [I + S (α)]A is also a strictly diagonal dominant Z -matrix and is shown that the proposed method is also superior to other iterative methods.
Journal ArticleDOI

Modified Gauss–Seidel type methods and Jacobi type methods for Z-matrices

TL;DR: In this article, the convergence analysis for modified Gauss-Seidel and Jacobi type iterative methods is presented and a comparison of spectral radius among the Gauss -Seidel iterative method and these modified methods is provided.
Proceedings ArticleDOI

Survey of Information Security Risk Assessment

TL;DR: A survey is proposed in which the common risk assessment methods are divided into four types: vulnerability identification and risk assessment, risk factors simulation and risk estimation, security situation assessment, and the risk calculation based on business process analysis.
Related Papers (5)
Trending Questions (1)
Is SVM a part of deep learning?

Support Vector Machine(SVM)is one of novel learning machine methods, its advantages are simple structure, strong compatibility, global optimization, least raining time and better generalization.