Self-similarity analysis of network threat time series

In order to validate the feasibility and applicability of the chaotic prediction model of network threat time se-ries,a fractal self-similarity analysis method for network threat time series based on the R/S (rescaled range) analysis was proposed. Using this method,the Hurst exponent of the represen...

Full description

Saved in:
Bibliographic Details
Main Authors: XUAN Lei, LU Xi-cheng, YU Rui-hou, ZHAO Xue-ming
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2008-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74656710/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850123920412246016
author XUAN Lei
LU Xi-cheng
YU Rui-hou
ZHAO Xue-ming
author_facet XUAN Lei
LU Xi-cheng
YU Rui-hou
ZHAO Xue-ming
author_sort XUAN Lei
collection DOAJ
description In order to validate the feasibility and applicability of the chaotic prediction model of network threat time se-ries,a fractal self-similarity analysis method for network threat time series based on the R/S (rescaled range) analysis was proposed. Using this method,the Hurst exponent of the representative samples from the three data sets of network threat were computed and tested. It was verified that there exist statistic self-similarities in continuous and non-sparse discrete time series of network threat so that it will be feasible to predict. On the other hand,there is no statistic self-similarity in sparse discrete threat time series and it will be very difficult to predict. The research outcome establishes the theory base to utilize the complex non-linearity system theory such as fractal and chaos to process the information security risk as-sessment and network threat prediction.
format Article
id doaj-art-d7e58a6efac44bf3bbb007369ebfecce
institution OA Journals
issn 1000-436X
language zho
publishDate 2008-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-d7e58a6efac44bf3bbb007369ebfecce2025-08-20T02:34:28ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-01455074656710Self-similarity analysis of network threat time seriesXUAN LeiLU Xi-chengYU Rui-houZHAO Xue-mingIn order to validate the feasibility and applicability of the chaotic prediction model of network threat time se-ries,a fractal self-similarity analysis method for network threat time series based on the R/S (rescaled range) analysis was proposed. Using this method,the Hurst exponent of the representative samples from the three data sets of network threat were computed and tested. It was verified that there exist statistic self-similarities in continuous and non-sparse discrete time series of network threat so that it will be feasible to predict. On the other hand,there is no statistic self-similarity in sparse discrete threat time series and it will be very difficult to predict. The research outcome establishes the theory base to utilize the complex non-linearity system theory such as fractal and chaos to process the information security risk as-sessment and network threat prediction.http://www.joconline.com.cn/zh/article/74656710/network threat time seriesfractalself-similarityHurst exponent
spellingShingle XUAN Lei
LU Xi-cheng
YU Rui-hou
ZHAO Xue-ming
Self-similarity analysis of network threat time series
Tongxin xuebao
network threat time series
fractal
self-similarity
Hurst exponent
title Self-similarity analysis of network threat time series
title_full Self-similarity analysis of network threat time series
title_fullStr Self-similarity analysis of network threat time series
title_full_unstemmed Self-similarity analysis of network threat time series
title_short Self-similarity analysis of network threat time series
title_sort self similarity analysis of network threat time series
topic network threat time series
fractal
self-similarity
Hurst exponent
url http://www.joconline.com.cn/zh/article/74656710/
work_keys_str_mv AT xuanlei selfsimilarityanalysisofnetworkthreattimeseries
AT luxicheng selfsimilarityanalysisofnetworkthreattimeseries
AT yuruihou selfsimilarityanalysisofnetworkthreattimeseries
AT zhaoxueming selfsimilarityanalysisofnetworkthreattimeseries