Journal on Communications ›› 2019, Vol. 40 ›› Issue (4): 49-61.doi: 10.11959/j.issn.1000-436x.2019096

• Papers • Previous Articles     Next Articles

Collection policy refining method for threat monitoring in complex network environment

Fenghua LI1,2,3,Zifu LI1,2,Ling LI1,2,Ming ZHANG4,Kui GENG1,Yunchuan GUO1()   

  1. 1 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    2 School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China
    3 Science and Technology on Communication Networks Laboratory,Shijiazhuang 050081,China
    4 School of Cyber Engineering,Xidian University,Xi’an 710071,China
  • Revised:2019-03-23 Online:2019-04-25 Published:2019-05-05
  • Supported by:
    The National Key Research and Development Program of China(2016YFB0801001);The National Natural Science Foundation of China(61672515);Innovative Practice Project of College Students in Chinese Academy of Sciences

Abstract:

Personalized collect policy is one of the necessary conditions for effectively monitoring threats in the complex network environment.However,differences in security requirements and threat types make it difficult to effectively generate personalized collect policy.To address the above problem,a collection policy automatic refinement method was designed.Firstly,a hierarchical model of collection policy was proposed.Then,by transforming the policy refinement into a nonlinear optimization problem,a genetic algorithm was designed to balance between collection revenue and collection cost.Finally,simulation experiments verify that according to the requirements of high-level monitoring,the acquisition scheme can be automatically generated.

Key words: data collection, threat monitoring, policy refinement, hybrid optimization

CLC Number: 

No Suggested Reading articles found!