Table of Content

Open Access iconOpen Access

ARTICLE

System Architecture and Key Technologies of Network Security Situation Awareness System YHSAS

Weihong Han1, Zhihong Tian1,*, Zizhong Huang2, Lin Zhong3, Yan Jia2

Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, 510006, China.
Computer School, National University of Defense Technology, Changsha, 410073, China.
Electrical and Computer Engineering, Rice University, 77051, USA.

* Corresponding Author: Zhihong Tian. Email: email.

Computers, Materials & Continua 2019, 59(1), 167-180. https://doi.org/10.32604/cmc.2019.05192

Abstract

Network Security Situation Awareness System YHSAS acquires, understands and displays the security factors which cause changes of network situation, and predicts the future development trend of these security factors. YHSAS is developed for national backbone network, large network operators, large enterprises and other large-scale network. This paper describes its architecture and key technologies: Network Security Oriented Total Factor Information Collection and High-Dimensional Vector Space Analysis, Knowledge Representation and Management of Super Large-Scale Network Security, Multi-Level, Multi-Granularity and Multi-Dimensional Network Security Index Construction Method, Multi-Mode and Multi-Granularity Network Security Situation Prediction Technology, and so on. The performance tests show that YHSAS has high real-time performance and accuracy in security situation analysis and trend prediction. The system meets the demands of analysis and prediction for large-scale network security situation.

Keywords


Cite This Article

W. Han, Z. Tian, Z. Huang, L. Zhong and Y. Jia, "System architecture and key technologies of network security situation awareness system yhsas," Computers, Materials & Continua, vol. 59, no.1, pp. 167–180, 2019. https://doi.org/10.32604/cmc.2019.05192

Citations




cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 3088

    View

  • 1425

    Download

  • 0

    Like

Share Link