首页 > 范文大全 > 正文

The Application of Support Vector Machine in Network Security Evaluation

开篇:润墨网以专业的文秘视角,为您筛选了一篇The Application of Support Vector Machine in Network Security Evaluation范文,如需获取更多写作素材,在线客服老师一对一协助。欢迎您的阅读与分享!

Abstract: Network safety risk assessment of the solution is a key part of network security. support vector machine method to overcome the defects of the traditional evaluation method (such as neural network method) of the nonlinear and local minimum value. This paper describes the content and index of network safety risk assessment, and puts forward a network safety risk assessment method based on support vector machine. The experimental results show that the method is feasible and effective.

Key words: Risk Evaluation; Support Vector Machine; Network security

1 Introduction

Along with the development of the computer network technology, network has affected every aspect of our lives, brings to our life great convenience. However, the problem of network security is becoming more and more outstanding. Network security risk evaluation has become the key process to solve in the network security, has become in this field of research hot spot. The task of network safety risk assessment of the risk analysis is loopholes and each network system and information system, and put forward the corresponding measures to control risk to the minimum, to ensure the normal operation of the whole network.

2 THE CONTENT OF NETWORK SECURITY RISK EVALUATION

Have a lot of malicious conditions in network system (such as data leak, the system damage, service interruptions. The reason is a loophole in the network. The network safety risk assessment is a calculation and assesses the risk of network system in order to prevent the emerging threats. The network security risk assessment factors as shown in figure 1 shows, including the threat identification, vulnerability appraisal, assets appraisal.

3. INDICATORS OF NETWORK SECURITY RISK EVALUATION

The value of the network security risk mainly includes three aspects, that is, the value of assets, threats and vulnerabilities. The network security index of risk assessment is based on the three fields. These indicators of network safety risk assessment as shown in figure 2 shows.

3.1 Assets

Assets are to point to have something in the network system of values, such as: operating system, network, network management, id, computer hardware, switch, firewall, and router.

3.2 Threat

This threat is a potential damage to the network. There are many factors including the threat of physical environment, the hardware and software fault, malicious code, hacker attacks, operating errors, the information disclosure and falsifying information, threat assessment is through the environment and loss of network system calculation.