System security assessment based on knowledge base

Under the two kinds of system operation conditions,abnormal state and normal state,indicated data on behalf of the system running status was collected by system monitoring tools such as nmon,and the obtained index data was quantitatively operated. The features of multidimensional behavior was constr...

Full description

Saved in:
Bibliographic Details
Main Author: Yuheng XING
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2016-04-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2016115/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850090786714025984
author Yuheng XING
author_facet Yuheng XING
author_sort Yuheng XING
collection DOAJ
description Under the two kinds of system operation conditions,abnormal state and normal state,indicated data on behalf of the system running status was collected by system monitoring tools such as nmon,and the obtained index data was quantitatively operated. The features of multidimensional behavior was constructed which could reflect the running state of the system. The index data has been carried on by effective feature extraction by means of the between-class and within-class distance measurement criterion,and knowledge base of behavior features was constructed which reflects the system running state. The decision tree was constructed to judge whether the system of state was secure through data features of behavior knowledge base.
format Article
id doaj-art-eaa78485ff1b45a1afcd2cbbee414169
institution DOAJ
issn 1000-0801
language zho
publishDate 2016-04-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-eaa78485ff1b45a1afcd2cbbee4141692025-08-20T02:42:29ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012016-04-013219219659609858System security assessment based on knowledge baseYuheng XINGUnder the two kinds of system operation conditions,abnormal state and normal state,indicated data on behalf of the system running status was collected by system monitoring tools such as nmon,and the obtained index data was quantitatively operated. The features of multidimensional behavior was constructed which could reflect the running state of the system. The index data has been carried on by effective feature extraction by means of the between-class and within-class distance measurement criterion,and knowledge base of behavior features was constructed which reflects the system running state. The decision tree was constructed to judge whether the system of state was secure through data features of behavior knowledge base.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2016115/knowledge base of behavior featurebetween-class and within-class distance measurement criteriondecision tree
spellingShingle Yuheng XING
System security assessment based on knowledge base
Dianxin kexue
knowledge base of behavior feature
between-class and within-class distance measurement criterion
decision tree
title System security assessment based on knowledge base
title_full System security assessment based on knowledge base
title_fullStr System security assessment based on knowledge base
title_full_unstemmed System security assessment based on knowledge base
title_short System security assessment based on knowledge base
title_sort system security assessment based on knowledge base
topic knowledge base of behavior feature
between-class and within-class distance measurement criterion
decision tree
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2016115/
work_keys_str_mv AT yuhengxing systemsecurityassessmentbasedonknowledgebase