Network security risk assessment based on support vector machine
Citations
6 citations
Cites background or methods from "Network security risk assessment ba..."
...Chen and Tu (2011) and Liu et al. (2012) stated that a traditional single point and locally oriented defense approach is unable to meet nowadays network security requirements....
[...]
...Chen and Tu (2011) and Liu et al. (2012) stated that a traditional single point and locally oriented defense approach is unable to meet nowadays network security requirements. Chen and Tu (2011) adapted a support vector machine (SVM) algorithm in order to apply it to network security risk assessment. Luo and Liu (2012) proposed a similar solution that intends to improve the accuracy and reliability of the risk evaluation of network information security risk....
[...]
...Chen and Tu (2011) and Liu et al. (2012) stated that a traditional single point and locally oriented defense approach is unable to meet nowadays network security requirements. Chen and Tu (2011) adapted a support vector machine (SVM) algorithm in order to apply it to network security risk assessment. Luo and Liu (2012) proposed a similar solution that intends to improve the accuracy and reliability of the risk evaluation of network information security risk. For that purpose the authors used rough set theory in order to reduce the number of factors that may affect security risk. Recently, it has also been indicated that traditional security protocols in an Open Systems Interconnection (OSI) layered model lack cooperation. As a result, the performance degradation is observed due to the redundancy of security mechanisms. Therefore, the mechanism of network complex event correlation is seen as a substantial approach that can address the problem of performance and cooperation among security mechanisms deployed in different OSI layers. Liu et al. (2012) proposed a network security events correlation scheme based on rough set theory....
[...]
...Chen and Tu (2011) and Liu et al. (2012) stated that a traditional single point and locally oriented defense approach is unable to meet nowadays network security requirements. Chen and Tu (2011) adapted a support vector machine (SVM) algorithm in order to apply it to network security risk assessment. Luo and Liu (2012) proposed a similar solution that intends to improve the accuracy and reliability of the risk evaluation of network information security risk. For that purpose the authors used rough set theory in order to reduce the number of factors that may affect security risk. Recently, it has also been indicated that traditional security protocols in an Open Systems Interconnection (OSI) layered model lack cooperation. As a result, the performance degradation is observed due to the redundancy of security mechanisms. Therefore, the mechanism of network complex event correlation is seen as a substantial approach that can address the problem of performance and cooperation among security mechanisms deployed in different OSI layers. Liu et al. (2012) proposed a network security events correlation scheme based on rough set theory. The authors built a database of network security events and knowledge base that includes a rule generation method and rule matcher. This method is intended to solve the problem of simplification and correlation of massive security events. As stated in their paper, this is obtained due to data discretization, attribute reduction, value reduction, and rule generation. Ongoing works are also dedicated to the application of classifiers to various aspects of cybersecurity, such as, for example, spam detection, as proposed in Zmyslony et al. (2012) and Wrótniak and Wozniak (2012). In addition, cooperation between off-line and on-line analysis has recently been signalized as essential to security....
[...]
...Chen and Tu (2011) adapted a support vector machine (SVM) algorithm in order to apply it to network security risk assessment....
[...]
5 citations
Cites methods from "Network security risk assessment ba..."
...The literature [3] researched the prediction methods based on Grey Theory; In the literature [4], situation value has the characteristics of the Nonlinear, so it established the prediction methods based on neural network; The literature [5]used the SVM prediction method to solve over-fitting…...
[...]
3 citations
Cites background from "Network security risk assessment ba..."
...[16], which could make up for the shortcomings of neural network method....
[...]
Cites background from "Network security risk assessment ba..."
...Therefore, it has certain advantages in applying network security risk assessment [12]....
[...]
References
52 citations
40 citations
33 citations
25 citations
21 citations