System based on Bayesian estimation for evaluating credibility of countermeasure information of computer network

A computer network and Bayesian estimation technology, applied in computer security devices, calculations, instruments, etc., can solve the problems that the evaluation method of CNO intelligence information credibility has not yet appeared

Inactive Publication Date: 2010-05-26
BEIHANG UNIV
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Most of the current theories and models about information evaluation are trying to find an evaluation method applicable to all situations from a macro perspective, but the evaluation method for the credibility of CNO intelligence information has not yet appeared

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System based on Bayesian estimation for evaluating credibility of countermeasure information of computer network
  • System based on Bayesian estimation for evaluating credibility of countermeasure information of computer network
  • System based on Bayesian estimation for evaluating credibility of countermeasure information of computer network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0051] The target of the CNO in this experiment is the Beihang website server, and the credibility evaluation object is the response time of the Beihang homepage, so it is necessary to establish the prior distribution of the Beihang homepage response time. In the experiment, Wireshark [10] network protocol analyzer was used to intercept the network data packets when visiting the Beihang homepage each time, and the response time was calculated from it. The definition of response time in this experiment is as follows.

[0052] Response time of the home page: The interception time of the server's response to the user's first HTTP message after the TCP three-way handshake connection is established. Generally, it is the fifth packet intercepted by Wireshark for each access packet.

[0053] Considering the impact of network traffic conditions in different time periods of the day on the test results, the experimental data established by the response time prior distribution is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system based on Bayesian estimation for evaluating the credibility of countermeasure information of a computer network, which comprises a service response time experimental data configuring module (11), a prior distribution establishing module (1), a prior distribution initial value configuring module (12), an evaluation data inputting module (2), a Bayes formula constructing and computing module (21), a parameter maximum posterior estimation computing module (22), a posterior distribution constructing module (23) and an information credibility computing module (3). By introducing the Bayesian statistical theory, the invention provides a specific evaluation method aiming at the content credibility of the service response time in the running state of network nodes, and the information credibility is obtained by the calculation according to the probability that the information occurs in the historical knowledge. The Bayesian statistical theory is widely applied to the posterior distribution for observation objects established on the basis of prior distribution and posterior information.

Description

technical field [0001] The present invention relates to a kind of computer network countermeasure (CNO) information processing, more particularly, refers to a kind of computer network countermeasure (CNO) intelligence information credibility evaluation system based on Bayesian estimation. Background technique [0002] Computer network operations (CNO for short) refers to activities and behaviors on computer networks that enhance and maintain one's own information capabilities, and prevent and weaken the opponent's capabilities and efforts in order to gain information advantages. The intelligence process refers to the process by which information is converted into intelligence and obtained by users. The process consists of six interrelated intelligence activities: planning and direction, collection, processing and processing, analysis and production, distribution and integration, evaluation and feedback. The research content of this patent focuses on the information credibil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/57
Inventor 夏春和孙芸芸姚珊焦健
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products