Title :
Application of Bayesian Network in the Traceback of Cyber Attack
Author :
Gong, YiShan ; Long, Tao
Author_Institution :
Foreign Language Inst., Shenyang Univ. of Technol., Shenyang, China
Abstract :
Applying Bayesian network in tracing cyber attack, this paper finds the fountainhead quickly through data analyzing. It contains mode creating, parameter learning, simulation experience and explores the hidden regularity. Finally it presents disadvantages of this method and previews the further application.
Keywords :
belief networks; data analysis; Bayesian network; Cyber attack; data analysis; parameter learning; Bayesian methods; Computer hacking; Computers; IP networks; Internet; Intrusion detection;
Conference_Titel :
Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5391-7
Electronic_ISBN :
978-1-4244-5392-4
DOI :
10.1109/CISE.2010.5676903