Multi-dimensional Network Security Situation Assessment

被引:3
作者
Zhu, Lina [1 ,2 ]
Xia, Guoen [3 ]
Zhang, Zuochang [2 ]
Li, Jianhua [1 ]
Zhou, Renjie [4 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai, Peoples R China
[2] Guangxi Univ Finance & Econ, Sch Informat & Stat, Nanning, Peoples R China
[3] Guangxi Univ Finance & Econ, Dept Acad Affairs, Nanning, Peoples R China
[4] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Key Lab Complex Syst Modeling & Simulat, Hangzhou, Zhejiang, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2016年 / 10卷 / 11期
基金
中国国家自然科学基金; 浙江省自然科学基金;
关键词
network security; situation assessment; vulnerability; network attack; threat;
D O I
10.14257/ijsia.2016.10.11.14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security situation awareness is vital important for network security supervision. In order to obtain the network security situation effectively, a multidimensional assessment method is proposed in this paper. The method is composed of three dimensions at different levels, namely vulnerability, threat and basic operation, with quantitative calculation method for each index. In the service layer, CVSS standard is adopted to assess the vulnerability situation, and simplified DREAD model is chosen for the threat situation. In the node layer, the vulnerability situation in the service layer is added with a weight, the threat situation in the service layer is accumulated according to attack paths based on Markov model, and the basic operation situation is evaluated by D-S evidence fusion of several host and network performance index. In the network layer, each situation equals to weighted summation of corresponding situation in the node layer. Experimental results show the ease of use of this method, and multi-dimensional situation depicts the overall safety evolution process of network system accurately and intuitively.
引用
收藏
页码:153 / 164
页数:12
相关论文
共 17 条
[1]  
BASS T, 1999, P IRIS NAT S SENS DA
[2]   Network Security Threats Situation Assessment and Analysis Technology Study [J].
Cai, Xiangdong ;
Yang Jingyi ;
Zhang, Huanyu .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05) :217-224
[3]   Quantitative hierarchical threat evaluation model for network security [J].
State Key Laboratory of Manufacturing System, Center for Networked Systems and Information Security, Xi'an Jiaotong University, Xi'an 710049, China ;
不详 .
Ruan Jian Xue Bao, 2006, 4 (885-897) :885-897
[4]  
CVSS: common vulnerability scoring system version 3.0 calculator, 2015, CVSS COMMON VULNERAB
[5]   Exploring risk flow attack graph for security risk assessment [J].
Dai, Fangfang ;
Hu, Ying ;
Zheng, Kangfeng ;
Wu, Bin .
IET INFORMATION SECURITY, 2015, 9 (06) :344-353
[6]  
Frigault M., 2008, P 4 ACM WORKSH QUAL
[7]  
Gorodetsky V., 2004, P 8 INT C KNOWK BAS
[8]  
Iliofotou M., 2007, P 7 ACM SIGCOMM C IN
[9]  
Kotenko I., 2014, P 2 IFIP TC5 8 INT C
[10]  
Olzak T., 2006, PRACTICAL APPROACH T