System security assessment based on knowledge base
Under the two kinds of system operation conditions,abnormal state and normal state,indicated data on behalf of the system running status was collected by system monitoring tools such as nmon,and the obtained index data was quantitatively operated. The features of multidimensional behavior was constr...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Beijing Xintong Media Co., Ltd
2016-04-01
|
| Series: | Dianxin kexue |
| Subjects: | |
| Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2016115/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850090786714025984 |
|---|---|
| author | Yuheng XING |
| author_facet | Yuheng XING |
| author_sort | Yuheng XING |
| collection | DOAJ |
| description | Under the two kinds of system operation conditions,abnormal state and normal state,indicated data on behalf of the system running status was collected by system monitoring tools such as nmon,and the obtained index data was quantitatively operated. The features of multidimensional behavior was constructed which could reflect the running state of the system. The index data has been carried on by effective feature extraction by means of the between-class and within-class distance measurement criterion,and knowledge base of behavior features was constructed which reflects the system running state. The decision tree was constructed to judge whether the system of state was secure through data features of behavior knowledge base. |
| format | Article |
| id | doaj-art-eaa78485ff1b45a1afcd2cbbee414169 |
| institution | DOAJ |
| issn | 1000-0801 |
| language | zho |
| publishDate | 2016-04-01 |
| publisher | Beijing Xintong Media Co., Ltd |
| record_format | Article |
| series | Dianxin kexue |
| spelling | doaj-art-eaa78485ff1b45a1afcd2cbbee4141692025-08-20T02:42:29ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012016-04-013219219659609858System security assessment based on knowledge baseYuheng XINGUnder the two kinds of system operation conditions,abnormal state and normal state,indicated data on behalf of the system running status was collected by system monitoring tools such as nmon,and the obtained index data was quantitatively operated. The features of multidimensional behavior was constructed which could reflect the running state of the system. The index data has been carried on by effective feature extraction by means of the between-class and within-class distance measurement criterion,and knowledge base of behavior features was constructed which reflects the system running state. The decision tree was constructed to judge whether the system of state was secure through data features of behavior knowledge base.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2016115/knowledge base of behavior featurebetween-class and within-class distance measurement criteriondecision tree |
| spellingShingle | Yuheng XING System security assessment based on knowledge base Dianxin kexue knowledge base of behavior feature between-class and within-class distance measurement criterion decision tree |
| title | System security assessment based on knowledge base |
| title_full | System security assessment based on knowledge base |
| title_fullStr | System security assessment based on knowledge base |
| title_full_unstemmed | System security assessment based on knowledge base |
| title_short | System security assessment based on knowledge base |
| title_sort | system security assessment based on knowledge base |
| topic | knowledge base of behavior feature between-class and within-class distance measurement criterion decision tree |
| url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2016115/ |
| work_keys_str_mv | AT yuhengxing systemsecurityassessmentbasedonknowledgebase |