CNSSA: A Comprehensive Network Security Situation Awareness System

被引:9
作者
Xi, Rongrong [1 ]
Jin, Shuyuan [2 ]
Yun, Xiaochun [1 ]
Zhang, Yongzheng [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Melbourne, Australia
来源
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11 | 2011年
基金
中国国家自然科学基金;
关键词
Network security situation awareness; quantitative assessment; visualization;
D O I
10.1109/TrustCom.2011.62
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With tremendous attacks in the Internet, there is a high demand for network analysts to know about the situations of network security effectively. Traditional network security tools lack the capability of analyzing and assessing network security situations comprehensively. In this paper, we introduce a novel network situation awareness tool - CNSSA (Comprehensive Network Security Situation Awareness) - to perceive network security situations comprehensively. Based on the fusion of network information, CNSSA makes a quantitative assessment on the situations of network security. It visualizes the situations of network security in its multiple and various views, so that network analysts can know about the situations of network security easily and comprehensively. The case studies demonstrate how CNSSA can be deployed into a real network and how CNSSA can effectively comprehend the situation changes of network security in real time.
引用
收藏
页码:482 / 487
页数:6
相关论文
共 22 条
[1]  
[Anonymous], 2003, NIST SPECIAL PUBLICA
[2]  
Bikash Sabata, 2006, P MULT MULT INF FUS, P1
[3]   Quantitative hierarchical threat evaluation model for network security [J].
State Key Laboratory of Manufacturing System, Center for Networked Systems and Information Security, Xi'an Jiaotong University, Xi'an 710049, China ;
不详 .
Ruan Jian Xue Bao, 2006, 4 (885-897) :885-897
[4]  
Gula R., 2009, TECHNICAL REPORT
[5]  
Hinman ML, 2002, PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOL I, P687, DOI 10.1109/ICIF.2002.1021221
[6]  
Jajodia Sushil, 2009, CYBER SITUATION AWAR
[7]  
Jaquith A., 2007, SECURITY MERICS REPL
[8]  
Kemmerer Richard, 2008, P NETW ATT DET DEF
[9]  
Lakkaraju Kiran, 2004, P ACM WORKSH VIS DAT
[10]  
Liggins M., 2008, HDB MULTISENSOR DATA, V2nd