Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 473504, 8 pages
http://dx.doi.org/10.1155/2014/473504
Research Article

Historical Feature Pattern Extraction Based Network Attack Situation Sensing Algorithm

1Department of Industrial Engineering, Tsinghua University, Beijing 100084, China
2Bengbu Automobile NCO Academy, Bengbu 233011, China
3Tianjin Port (Group), Ltd., Tianjin 300456, China

Received 20 February 2014; Accepted 18 March 2014; Published 27 April 2014

Academic Editors: Y. Mao and Z. Zhou

Copyright © 2014 Yong Zeng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Wang, Z.-G. Qin, and L. Ye, “Research on prediction technique of network situation awareness,” in Proceedings of the IEEE International Conference on Cybernetics and Intelligent Systems (CIS '08), pp. 570–574, Chengdu, China, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. H. Zhu, R. Lu, X. Shen, and X. Lin, “Security in service-oriented vehicular networks,” IEEE Wireless Communications, vol. 16, no. 4, pp. 16–22, 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. G. Jakobson, J. Buford, and L. Lewis, “Situation management,” IEEE Communications Magazine, vol. 48, no. 3, pp. 110–111, 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. F. Lan, W. Chunlei, and M. Guoqing, “A framework for network security situation awareness based on knowledge discovery,” in Proceedings of the 2nd International Conference on Computer Engineering and Technology (ICCET '10), vol. 1, pp. 226–231, Chengdu, China, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. W. Lou and K. Ren, “Security, privacy, and accountability in wireless access networks,” IEEE Wireless Communications, vol. 16, no. 4, pp. 80–87, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. A. Feng, M. Knieser, M. Rizkalla, B. King, P. Salama, and F. Bowen, “Embedded system for sensor communication and security,” IET Information Security, vol. 6, no. 2, pp. 111–121, 2012. View at Publisher · View at Google Scholar
  7. B. Magoutas, G. Mentzas, and D. Apostolou, “Proactive situation management in the future internet: the case of the smart power grid,” in Proceedings of the 22nd International Workshop on Database and Expert Systems Applications (DEXA '11), pp. 267–271, Toulouse, Greece, September 2011. View at Publisher · View at Google Scholar
  8. C. G. Keller, T. Dang, H. Fritz, A. Joos, C. Rabe, and D. M. Gavrila, “Active pedestrian safety by automatic braking and evasive steering,” IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 4, pp. 1292–1304, 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. X. Chen, H. Gao, and Y. Fu, “Situation analysis and prediction of web public sentiment,” in Proceedings of the International Symposium on Information Science and Engineering (ISISE '08), vol. 2, pp. 707–710, Shanghai, China, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. N. Zhang, N. Cheng, N. Lu, H. Zhou, J. W. Mark, and X. Shen, “Risk-aware cooperative spectrum access for multi-channel cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 3, pp. 516–527, 2014. View at Publisher · View at Google Scholar
  11. R. K. Iyer, Z. Kalbarczyk, K. Pattabiraman et al., “Toward application-aware security and reliability,” IEEE Security & Privacy, vol. 5, no. 1, pp. 57–62, 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. K. Janac, “Control of large power systems based on situation recognition and high speed simulation,” IEEE Transactions on Power Apparatus and Systems, vol. 98, no. 3, pp. 710–715, 1979. View at Publisher · View at Google Scholar · View at Scopus
  13. R. K. Iyer, Z. Kalbarczyk, K. Pattabiraman et al., “Toward application-aware security and reliability,” IEEE Security & Privacy, vol. 5, no. 1, pp. 57–62, 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Kitadai, M. Nakagawa, H. Baba, and A. Watanabe, “Similarity evaluation and shape feature extraction for character pattern retrieval to support reading historical documents,” in Proceedings of the 10th IAPR International Workshop on Document Analysis Systems (DAS '12), pp. 359–336, Gold Cost, Australia, March 2012. View at Publisher · View at Google Scholar
  15. J. R. Almeida, J. B. Camargo, and P. S. Cugnasca, “Safety and security in critical applications and in information systems ?? A comparative study,” IEEE Latin America Transactions, vol. 11, no. 4, pp. 1127–1133, 2013. View at Publisher · View at Google Scholar
  16. M. Panteli, P. A. Crossley, D. S. Kirschen, and D. J. Sobajic, “Assessing the impact of insufficient situation awareness on power system operation,” IEEE Transactions on Power Systems, vol. 26, no. 3, pp. 2967–2977, 2013. View at Publisher · View at Google Scholar
  17. M. M. Masud, Q. Chen, L. Khan et al., “Classification and adaptive novel class detection of feature-evolving data streams,” IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 7, pp. 1484–1497, 2013. View at Publisher · View at Google Scholar
  18. L. Jibao, W. Huiqiang, L. Xiaowu, and L. Ying, “A quantitative prediction method of network security situation based on wavelet neural network,” in Proceedings of the 1st International Symposium on Data, Privacy, and E-Commerce (ISDPE '07), pp. 197–202, Chengdu, China, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  19. W. He, G. Hu, and H. Xiang, “Apply anomaly grey forecasting algorithm to cyberspace situation prediction,” in Proceedings of the IEEE International Conference on Cybernetics and Intelligent Systems (CIS '08), pp. 503–505, Chengdu, China, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  20. R.-F. Wu and G.-L. Chen, “Research of network security situation prediction based on multidimensional cloud model,” in Proceedings of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS '12), pp. 409–414, Palermo, Italy, 2012. View at Publisher · View at Google Scholar
  21. X. Cheng and S. Lang, “Research on network security situation assessment and prediction,” in Proceedings of the 4th International Conference on Computational and Information Sciences (ICCIS '12), pp. 864–867, Chongqing, China, August 2012. View at Publisher · View at Google Scholar