Network Security Situation Evaluation Method Based on Attack Intention Recognition

被引:0
作者
Wang Kun [1 ]
Qiu Hui [1 ]
Yang Haopu [1 ]
Hou Di [2 ]
机构
[1] Zhengzhou Inst Informat Sci & Technol, Zhengzhou, Peoples R China
[2] Zhengzhou Univ, Zhengzhou, Peoples R China
来源
PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015) | 2015年
关键词
multi-stage attack; situation evaluation; network security; intention recognition; causal analysis;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper analyzed the existing network security situation evaluation methods and discovered that they can't accurately reflect the features of large-scale, synergetic, multi-stage gradually shown by network attack behaviors. For this purpose, under deep analyzing the association between attack intention and network configuration information, a network security situation evaluation method based on attack intention recognition was proposed. Unlike traditional method, the evaluation method was based on intruder. This method firstly made causal analysis of attack event and discovered intrusion path to recognize every attack stages, then realized situation evaluation based on the attack stages. Lastly the method recognized the attack intention of next stage to forecast network security situation based on achieved attack stages, combined with vulnerability and network connectivity. A simulation experiments for the proposed network security situation evaluation model is performed by network examples. The experimental results show that this method is more accurate on reflecting the truth of attack. And the method does not need training on the historical sequence, so the method is more effective on situation forecasting.
引用
收藏
页码:919 / 924
页数:6
相关论文
共 9 条
[1]   Intrusion detection systems and multisensor data fusion [J].
Bass, T .
COMMUNICATIONS OF THE ACM, 2000, 43 (04) :99-105
[2]  
Cristina Abad, 2006, P 14 INT C TEL SYST, P316
[3]  
Kavousi F, 2012, 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), P999, DOI 10.1109/ISTEL.2012.6483132
[4]  
Schiffman M, 2011, COMMON VULNERABILITY
[5]  
[韦勇 WEI Yong], 2009, [计算机学报, Chinese Journal of Computers], V32, P763
[6]  
Wei Yong, 2009, J COMPUTER RES DEV, V46, P353
[7]  
Xi Rong-Rong, 2015, Journal of Software, V26, P1638, DOI 10.13328/j.cnki.jos.004624
[8]  
[席荣荣 Xi Rongrong], 2015, [计算机学报, Chinese Journal of Computers], V38, P749
[9]  
Zhang Yong, 2011, Journal of Software, V22, P495, DOI 10.3724/SP.J.1001.2011.03751