[1]马艺宾,张洺浩*,韩雨,等.生成式网络安全态势谱曲方法研究[J].计算机技术与发展,2025,(04):59-64.[doi:10.20165/j.cnki.ISSN1673-629X.2024.0377]
 MA Yi-bin,ZHANG Ming-hao*,HAN Yu,et al.Research on Generative Network Security Situation Composer Method[J].,2025,(04):59-64.[doi:10.20165/j.cnki.ISSN1673-629X.2024.0377]
点击复制

生成式网络安全态势谱曲方法研究()

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2025年04期
页码:
59-64
栏目:
网络空间安全
出版日期:
2025-04-10

文章信息/Info

Title:
Research on Generative Network Security Situation Composer Method
文章编号:
1673-629X(2025)04-0059-06
作者:
马艺宾1张洺浩2*韩雨1王一川1黑新宏1
1. 西安理工大学 计算机科学与工程学院 陕西省网络计算与安全技术重点实验室,陕西 西安 710000;
2. 中国人民大学 公共管理学院,北京 100000
Author(s):
MA Yi-bin1ZHANG Ming-hao2*HAN Yu1WANG Yi-chuan1HEI Xin-hong1
1. Shaanxi Provincial Key Laboratory of Network Computing and Security Technology,School of Computer Science and Engineering,Xi’an University of Technology,Xi’an 710000,China;
2. School of Public Administration,Renmin University of China,Beijing 100000,China
关键词:
网络安全态势感知MIDI音乐音乐生成可听化
Keywords:
network securitysituational awarenessMIDI musicmusic generationauralization
分类号:
TP3-0;TP39
DOI:
10.20165/j.cnki.ISSN1673-629X.2024.0377
摘要:
随着网络时代的发展,网络安全问题日益突出,给网络空间安全带来了严峻挑战,亟需有效措施提升网络系统的安全防护能力,因此,网络安全态势感知的研究和应用愈加重要。 然而,传统的态势评估与可视化方法已逐渐难以应对大规模、高速的网络攻击。 为解决这一问题,该文探讨了网络态势影响因素与音乐元素之间的关系,提出了一种将网络态势与 MIDI 音乐结合的态势可听化方法,并构建了相应的模型。 首先,从态势组成的角度设计并提取态势属性,以评估当前的网络安全状况。 其次,在 MIDI 音乐生成模型中,设计并提取了 MIDI 音乐的关键属性,对其进行分级计算以构建音乐库。 最后,通过人工智能方法生成与网络态势相符合的音乐,实现了网络态势与音乐的映射。 实验结果表明,通过将网络态势信息转化为听觉信号这一方法相较于传统态势评估与可视化方法能够更有效地传达网络态势变化,尤其是可视化难以描述的复杂态势特征,态势可听化提供了更具直观性和实时性的态势感知手段。
Abstract:
With the development of the Internet era, network security issues have become increasingly prominent, bringing severe challenges to the security of cyberspace. Effective measures are urgently needed to improve the security protection capabilities of network systems. Therefore,the research and application of network security situation awareness has become increasingly important. However,traditional situation assessment and visualization methods have gradually become difficult to cope with large - scale and high - speed network attacks. To solve this problem,we explore the relationship between network situation influencing factors and music elements,propose a situation auralization method that combines network situation with MIDI music,and construct a corresponding model. Firstly,we design and extract situation attributes from the perspective of situation composition to evaluate the current network security status.Secondly,in the MIDI music generation model,we design and extract the key attributes of MIDI music,perform hierarchical calculations on it to construct a music library. Finally ,the music that is consistent with the network situation through artificial intelligence methods is generated to realize the mapping of network situation and music. The experimental results show that the method of converting network situation information into auditory signals can more effectively convey network situation changes than traditional situation assessment and visualization methods,especially complex situation features that are difficult to describe by visualization. Situation auralization provides a more intuitive and real-time situation awareness method.

相似文献/References:

[1]严华 蔡瑞英.即时通信监控系统的设计与实现[J].计算机技术与发展,2009,(07):242.
 YAN Hua,CAI Rui-ying.Design and Implementation of Monitoring System of Instant Messaging[J].,2009,(04):242.
[2]李生 邓一贵 唐学文 潘磊 林玉香.基于移动代理的分布式入侵检测系统的研究[J].计算机技术与发展,2009,(09):132.
 LI Sheng,DENG Yi-gui,TANG Xue-wen,et al.Research of Mobile Agent - Based Distributed Intrusion Detection System[J].,2009,(04):132.
[3]潘晓君.基于缓存超时的ARP欺骗攻击协议的研究[J].计算机技术与发展,2009,(10):167.
 PAN Xiao-jun.Research of ARP Spoofing Attack Protocol Based on Cache Overtime[J].,2009,(04):167.
[4]彭云峰 沈明玉.入侵防御系统在应急平台网络中的应用研究[J].计算机技术与发展,2009,(02):162.
 PENG Yun-feng,SHEN Ming-yu.Research on Intrusion Prevention System for Emergency Response Network[J].,2009,(04):162.
[5]师鸣若 姜中华 阎芳.一种快速宏观网络态势分析算法[J].计算机技术与发展,2009,(04):163.
 SHI Ming-ruo,JIANG Zhong-hua,YAN Fang.A Fast Security Cyberspace Situational Awareness Algorithm[J].,2009,(04):163.
[6]尚占锋 章登义.DDoS防御机制研究[J].计算机技术与发展,2008,(01):7.
 SHANG Zhan-feng,ZHANG Deng-yi.Research of DDoS Defense Mechanism[J].,2008,(04):7.
[7]涂溢彬 饶云波[] 廖云 周明天.蜜网系统在检测新型Rootkit中的应用[J].计算机技术与发展,2008,(01):181.
 TU Yi-bin,RAO Yun-bo,LIAO Yun,et al.Honeynet System Applied in New Pattern Rootkit[J].,2008,(04):181.
[8]邵晓宇 杨善林 褚伟.基于Linux入侵检测动态防火墙的设计与实现[J].计算机技术与发展,2008,(05):156.
 SHAO Xiao-yu,YANG Shan-lin,CHU Wei.Design and Implementation of Dynamic Intrusion Detection Firewall Based on Linux[J].,2008,(04):156.
[9]孙印杰 王敏 陈智芳.解析蜜罐技术在网络安全中的应用[J].计算机技术与发展,2008,(07):129.
 SUN Yin-jie,WANG Min,CHEN Zhi-fang.Analysis Honeypot Technology Application in Network Security[J].,2008,(04):129.
[10]曹莹莹 王绍棣 王汝传 张伟.恶意代码传播效果的控制技术研究[J].计算机技术与发展,2010,(08):128.
 CAO Ying-ying,WANG Shao-di,WANG Ru-chuan,et al.Research on Malware Code Propagation Effect Control Technology[J].,2010,(04):128.

更新日期/Last Update: 2025-04-10