Open Access

The Technical Research on the Assessment of Network Security Situation Based on D-S Evidence Theory


Cite

Figure 1

the technical framework of overall situation assessment
the technical framework of overall situation assessment

Figure 2

HMM training through sliding window algorithm
HMM training through sliding window algorithm

Figure 3

The overall process of situation weight assessment
The overall process of situation weight assessment

Figure 4

The key network topology structure in DARPA 2000
The key network topology structure in DARPA 2000

Figure 5

Threat situation diagram for the node “mill”
Threat situation diagram for the node “mill”

Figure 6

The graph of the vulnerability situation and the asset situation of node “mill”
The graph of the vulnerability situation and the asset situation of node “mill”

Figure 7

Accessing relationship graph of a sub network
Accessing relationship graph of a sub network

Figure 8

The threat situation element in the whole network
The threat situation element in the whole network

Figure 9

The situation elements of vulnerability and assets in the overall network
The situation elements of vulnerability and assets in the overall network

Figure 10

The trend graph of overall network situation
The trend graph of overall network situation

Figure 11

The comparison graph of the experimental results of three methods
The comparison graph of the experimental results of three methods
eISSN:
2444-8656
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics