Network security data fusion method based on ontology and D-S evidence theory

A technology of network security and evidence theory, applied in reasoning methods, secure communication devices, digital transmission systems, etc., can solve problems such as semantic ambiguity, data structure differences, and unresolved problems, and achieve the effect of reducing conflicts

Pending Publication Date: 2022-07-29
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the problem of difference in data structure and ambiguity in semantics has not been well resolved
Its shortcoming is that the event-based independence assumption has the problem of focal element explosion, which cannot effectively deal with high-conflict data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security data fusion method based on ontology and D-S evidence theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the technical solutions of the present invention more obvious and easy to understand, specific embodiments are given and described in detail below with reference to the accompanying drawings.

[0034] Step 1: Multi-source heterogeneous network security data collection

[0035] The method of the invention is based on the collected network security data, which mainly comes from equipment operation logs, security alarm logs, abnormal detection data, event data reported by manufacturers, etc.; the main contents include log data, detection data, reported event data, cyberspace asset data, etc. . In terms of data format, it also includes structured data, semi-structured data, and unstructured data. Therefore, network security data has the characteristics of multi-source heterogeneity and fragmentation.

[0036] Step 2: Multi-source heterogeneous network security data preprocessing

[0037] On the basis of analyzing the content of multi-source heterogeneous...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security data fusion method based on an ontology and a D-S evidence theory, and belongs to the technical field of network security and data fusion. Ontology modeling is performed on multi-source heterogeneous network security data based on an ontology theory and a domain ontology knowledge base, and a network security knowledge graph is constructed; and data reasoning fusion is realized by using a D-S evidence theory, and the method can solve the problem of knowledge fusion of multi-source heterogeneous data in the field of network security.

Description

technical field [0001] The invention relates to a network security data fusion method based on ontology and D-S evidence theory, and belongs to the technical fields of network security and data fusion. Background technique [0002] The multi-source heterogeneous data collected in the field of network security comes from different network traffic collection devices or security monitoring devices. Differences between devices and systems, as well as between data types themselves, not only lead to data model heterogeneity, but also data semantics. , grammar, etc. also have different degrees of heterogeneity. Since the multi-source heterogeneous data in the field of network security reflects the multi-faceted characteristics of the information source or the monitoring target, it is only possible to observe the security status of the network space as a whole by performing an effective knowledge fusion operation on it. [0003] With the continuous development of various data fusio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06N5/04G06N5/02H04L9/40
CPCG06N5/04G06N5/022G06N5/025H04L63/20
Inventor 刘倩乔赞瑞王国威张海霞彭媛媛连一峰蒋帅
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products