Framework for risk assessment in cyber situational awareness

被引:17
作者
Xi Rongrong [1 ]
Yun Xiaochun [1 ]
Hao Zhiyu [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Res Lab 2, Beijing 100089, Peoples R China
关键词
risk management; computer network security; cyber situational awareness; network analysts; network security situation; traditional detection; prevention measures; network situation; risk assessment; NETWORK; SECURITY;
D O I
10.1049/iet-ifs.2018.5189
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A large number of data is generated to help network analysts to evaluate the network security situation in traditional detection and prevention measures, but it is not used fully and effectively, there is not a holistic view of the network situation on it for now. To address this issue, a framework is proposed to evaluate the security situation of the network from three dimensions: threat, vulnerability and stability, and merge the results at decision level to measure the security situation of the overall network. In the case studies, the authors demonstrate how the framework is deployed in the network and how to use it to reflect the security situation of the network in real time. Results of the case study show that the framework can evaluate the security situation of the network accurately and reasonably.
引用
收藏
页码:149 / 156
页数:8
相关论文
共 21 条
  • [1] Comparing Vulnerability Severity and Exploits Using Case-Control Studies
    Allodi, Luca
    Massacci, Fabio
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 17 (01)
  • [2] [Anonymous], 2004, 4360 RISK MAN
  • [3] [Anonymous], 2007, 4765 RFC
  • [4] Bandes R., 2010, ANAL HDB USING SILK
  • [5] Barford P, 2010, ADV INFORM SECUR, V46, P71, DOI 10.1007/978-1-4419-0140-8_5
  • [6] CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection
    Doynikova, Elena
    Kotenko, Igor
    [J]. 2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017), 2017, : 346 - 353
  • [7] Frei S., 2006, P 2006 SIGCOMM WORKS, P131
  • [8] Jajodia S, 2005, MASSIVE COMP, V5, P247, DOI 10.1007/0-387-24230-9_9
  • [9] Lakkaraju Kiran., 2004, VIZSECDMSEC 04, P65, DOI DOI 10.1145/1029208.1029219
  • [10] Morin B, 2002, LECT NOTES COMPUT SC, V2516, P115