As sophisticated network attack methods increase, the decentralized security event processing methods based on a single device can no longer meet the cur-rent needs of network security management. The security event correlation analysis technology analyzes the various security events through correlation that can accurately judge and extract meaningful security events. This paper proposes an information security event correlation analysis method based on the adaptive optimization algorithm in order to imitate the constitution of clusters in two-dimensional gas where particles do not keep still until they irreversibly hit and "stick" together. The simulation is established to analyze the aggregation of information security events.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.