Skip to main content
Top
Published in: The Journal of Supercomputing 2/2020

01-09-2018

RETRACTED ARTICLE: Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction

Author: Pu Zaiyi

Published in: The Journal of Supercomputing | Issue 2/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

When establishing a network attack strategy, target network information is not certain, and the attacker lacks comprehensive, reliable and real-time attack information, making it difficult to perform an attack. To address this issue, a complex scientific network attack method is proposed. The attacker’s income, losses, costs and encountered risks related to a cyberattack are analysed, an index system is established, and a dynamic Bayesian network is used to comprehensively assess the attack effects on network nodes to overcome drawbacks of the traditional node importance assessment method, which relies on a single network topological index or makes static assessments of the target node. A simulation experiment shows that the proposed method synthesizes more node information and observed data for the attack, thereby avoiding the discrepancy between actual attack effects and theoretical expectations of attacks from static assessment and delivering higher levels of attack accuracy and efficiency than previous methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Disc 29(3):626–688MathSciNetCrossRef Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Disc 29(3):626–688MathSciNetCrossRef
2.
go back to reference Andrieu C, De FN, Doucet A (2014) Robust full Bayesian learning for radial basis networks. Neural Comput 13(10):2359–2407CrossRef Andrieu C, De FN, Doucet A (2014) Robust full Bayesian learning for radial basis networks. Neural Comput 13(10):2359–2407CrossRef
4.
go back to reference Moignard V, Woodhouse S, Haghverdi L et al (2015) Decoding the regulatory network for blood development from single-cell gene expression measurements. Nat Biotechnol 33(3):269CrossRefPubMedPubMedCentral Moignard V, Woodhouse S, Haghverdi L et al (2015) Decoding the regulatory network for blood development from single-cell gene expression measurements. Nat Biotechnol 33(3):269CrossRefPubMedPubMedCentral
5.
go back to reference Patel J, Shah S, Thakkar P et al (2015) Predicting stock and stock price index movement using trend deterministic data preparation and machine learning techniques. Expert Syst Appl 42(1):259–268CrossRef Patel J, Shah S, Thakkar P et al (2015) Predicting stock and stock price index movement using trend deterministic data preparation and machine learning techniques. Expert Syst Appl 42(1):259–268CrossRef
6.
go back to reference Bagnall A, Lines J, Hills J et al (2015) Time-series classification with COTE: the collective of transformation-based ensembles. IEEE Trans Knowl Data Eng 27(9):2522–2535CrossRef Bagnall A, Lines J, Hills J et al (2015) Time-series classification with COTE: the collective of transformation-based ensembles. IEEE Trans Knowl Data Eng 27(9):2522–2535CrossRef
7.
go back to reference Tatar A, Amorim MDD, Fdida S et al (2014) A survey on predicting the popularity of web content. J Internet Serv Appl 5(1):8CrossRef Tatar A, Amorim MDD, Fdida S et al (2014) A survey on predicting the popularity of web content. J Internet Serv Appl 5(1):8CrossRef
8.
go back to reference Gagnepain P, Henson RN, Anderson MC (2014) Suppressing unwanted memories reduces their unconscious influence via targeted cortical inhibition. Proc Natl Acad Sci USA 111(13):E1310ADSCrossRefPubMedPubMedCentral Gagnepain P, Henson RN, Anderson MC (2014) Suppressing unwanted memories reduces their unconscious influence via targeted cortical inhibition. Proc Natl Acad Sci USA 111(13):E1310ADSCrossRefPubMedPubMedCentral
9.
go back to reference Yerima SY, Sezer S, Mcwilliams G (2016) Analysis of Bayesian classification-based approaches for Android malware detection. Inf Secur IET 8(1):25–36CrossRef Yerima SY, Sezer S, Mcwilliams G (2016) Analysis of Bayesian classification-based approaches for Android malware detection. Inf Secur IET 8(1):25–36CrossRef
11.
go back to reference Kooij JFP, Schneider N, Flohr F et al (2014) Context-based pedestrian path prediction. Lect Notes Comput Sci 8694:618–633CrossRef Kooij JFP, Schneider N, Flohr F et al (2014) Context-based pedestrian path prediction. Lect Notes Comput Sci 8694:618–633CrossRef
12.
go back to reference Cecile B, David CJ, Matteo M et al (2015) Clustering attributed graphs: models, measures and methods. Netw Sci 3(3):408–444CrossRef Cecile B, David CJ, Matteo M et al (2015) Clustering attributed graphs: models, measures and methods. Netw Sci 3(3):408–444CrossRef
13.
go back to reference Amer MR, Peng L, Todorovic S (2014) HiRF: hierarchical random field for collective activity recognition in videos. In: European Conference on Computer Vision, Springer, Cham, pp 572–585 Amer MR, Peng L, Todorovic S (2014) HiRF: hierarchical random field for collective activity recognition in videos. In: European Conference on Computer Vision, Springer, Cham, pp 572–585
14.
go back to reference Naderpour M, Lu J, Zhang G (2014) An intelligent situation awareness support system for safety-critical environments. Decis Support Syst 59(1):325–340CrossRef Naderpour M, Lu J, Zhang G (2014) An intelligent situation awareness support system for safety-critical environments. Decis Support Syst 59(1):325–340CrossRef
15.
go back to reference Tahan G, Rokach L, Shahar Y (2014) Mal-ID: automatic malware detection using common segment analysis and meta-features. J Mach Learn Res 13(13):949–979MathSciNet Tahan G, Rokach L, Shahar Y (2014) Mal-ID: automatic malware detection using common segment analysis and meta-features. J Mach Learn Res 13(13):949–979MathSciNet
17.
go back to reference Ashokkumar P, Arunkumar N, Don S (2018) Intelligent optimal route recommendation among heterogeneous objects with keywords. Comput Electr Eng 68:526–535CrossRef Ashokkumar P, Arunkumar N, Don S (2018) Intelligent optimal route recommendation among heterogeneous objects with keywords. Comput Electr Eng 68:526–535CrossRef
20.
go back to reference Khanna A, Jain S, Aggarwal T, Kumar A, Gupta D, Julka A, Albuquerque V (2018) Optimized cuttlefish algorithm for diagnosis of parkinson’s disease. Cognit Syst Res 52:36–48CrossRef Khanna A, Jain S, Aggarwal T, Kumar A, Gupta D, Julka A, Albuquerque V (2018) Optimized cuttlefish algorithm for diagnosis of parkinson’s disease. Cognit Syst Res 52:36–48CrossRef
Metadata
Title
RETRACTED ARTICLE: Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction
Author
Pu Zaiyi
Publication date
01-09-2018
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 2/2020
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2575-3

Other articles of this Issue 2/2020

The Journal of Supercomputing 2/2020 Go to the issue

Premium Partner