Applying Bayesian network in tracing cyber attack, this paper finds the fountainhead quickly through data analyzing. It contains mode creating, parameter learning, simulation experience and explores the hidden regularity. Finally it presents disadvantages of this method and previews the further application.
展开▼