《计算机应用研究》|Application Research of Computers

基于本体的网络攻防博弈知识库构建方法研究

Research on construction method of network attack-defense game repository based on ontology

免费全文下载 (已被下载 次)  
获取PDF全文
作者 史云放,武东英,刘胜利,高翔
机构 数学工程与先进计算国家重点实验室,郑州 450002
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2014)11-3460-05
DOI 10.3969/j.issn.1001-3695.2014.11.059
摘要 针对目前还没有一个较为完善的攻防博弈知识库的情况,对基于本体的博弈知识库的构建方法进行了研究。首先对网络攻防博弈过程中所需要的博弈知识进行分析梳理,描述出知识库的体系结构;然后提出了一种网络攻防博弈知识库的构建框架,并根据此构建框架提出了构建算法;最后通过一个应用示例对算法进行了验证。结果表明构建算法是可用并有效的。
关键词 本体;网络攻防博弈;知识库;RDF(S)
基金项目 国家自然科学基金资助项目(61309007)
郑州市科技创新团队项目(10CXTD150)
河南省科技公关资助项目(102102210544)
本文URL http://www.arocmag.com/article/01-2014-11-059.html
英文标题 Research on construction method of network attack-defense game repository based on ontology
作者英文名 SHI Yun-fang, WU Dong-ying, LIU Sheng-li, GAO Xiang
机构英文名 State Key Laboratory of Mathematical Engineering & Advanced Computing, Zhengzhou 450002
英文摘要 As there isn’t a complete game repository, this paper studied the construction method on network attack-defense game repository. Firstly, it analyzed the knowledge which was needed in the attack-defense game process and then described the architecture of the repository.Secondly, it presented a construction frame aiming at network attack-defense game repository. Thirdly it presented a construction algorithm based on the frame.Finally it gave an application example to verify the algorithm, the result of the example turns to that the algorithm is available and effective.
英文关键词 ontology; network attack-defense game; repository; RDF(S)
参考文献 查看稿件参考文献
  [1] HE Wei, XIA Chun-he, WANG Hai-quan, et al. A game theoretical attack-defense model oriented to network security risk assessment[C] //Proc of International Conference on Computer Science and Software Engineering. [S. l. ] :IEEE Press, 2008:498-504.
[2] 高翔, 祝跃飞, 刘胜利. 应用三角模糊矩阵博弈的网络安全评估研究[J] . 西安交通大学学报, 2013, 47(8):49-53.
[3] TOWARDS G R. Toward principles for the design of ontologies used for knowledge sharing[J] . International Journal of Human-Computer Studies, 1995, 43(5-6):907-928.
[4] CHAN J, KISHORE R, STERNBERG P, et al. The gene ontology:enhancements for 2011[J] . Nucleic Acids Research, 2012, 40(D1):D559-D564.
[5] MOORE P, HU Bin, WAN Ji-zheng. Smart-context:a context ontology for pervasive mobile computing[J] . The Computer Journal, 2010, 53(2):191-207.
[6] 王前, 冯亚军, 杨兆民, 等. 基于本体的网络攻击模型及其应用[J] . 计算机科学, 2010, 37(6):114-117.
[7] 钟秀琴, 符红光, 佘莉, 等. 基于本体的几何学知识获取及知识表示[J] . 计算机学报, 2010, 33(1):167-174.
[8] 邓志鸿, 唐世渭, 张铭, 等. Ontology研究综述[J] . 北京大学学报:自然科学版, 2002, 38(5):730-738.
[9] MINSKY M. A framework for representing knowledge[R] Cambridge:Massachusetts Institute of Technology, 1974.
[10] DAN B, GUHA R V. Resource description framework (RDF) schema specification[EB/OL] . http://www. w3. org/TR/PR-rdf-schema/.
[11] 杜方, 陈跃国, 杜小勇. RDF 数据查询处理技术综述[J] . 软件学报, 2013, 24(6):1222-1242.
收稿日期 2013/11/5
修回日期 2013/12/26
页码 3460-3464
中图分类号 TP393.08;TP182
文献标志码 A