DocumentCode :
1873700
Title :
Application of Bayesian Network in the Traceback of Cyber Attack
Author :
Gong, YiShan ; Long, Tao
Author_Institution :
Foreign Language Inst., Shenyang Univ. of Technol., Shenyang, China
fYear :
2010
fDate :
10-12 Dec. 2010
Firstpage :
1
Lastpage :
3
Abstract :
Applying Bayesian network in tracing cyber attack, this paper finds the fountainhead quickly through data analyzing. It contains mode creating, parameter learning, simulation experience and explores the hidden regularity. Finally it presents disadvantages of this method and previews the further application.
Keywords :
belief networks; data analysis; Bayesian network; Cyber attack; data analysis; parameter learning; Bayesian methods; Computer hacking; Computers; IP networks; Internet; Intrusion detection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5391-7
Electronic_ISBN :
978-1-4244-5392-4
Type :
conf
DOI :
10.1109/CISE.2010.5676903
Filename :
5676903
Link To Document :
بازگشت