Network Security Situation Evaluation Method Based on Attack Intention Recognition

被引:0
|
作者
Wang Kun [1 ]
Qiu Hui [1 ]
Yang Haopu [1 ]
Hou Di [2 ]
机构
[1] Zhengzhou Inst Informat Sci & Technol, Zhengzhou, Peoples R China
[2] Zhengzhou Univ, Zhengzhou, Peoples R China
来源
PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015) | 2015年
关键词
multi-stage attack; situation evaluation; network security; intention recognition; causal analysis;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper analyzed the existing network security situation evaluation methods and discovered that they can't accurately reflect the features of large-scale, synergetic, multi-stage gradually shown by network attack behaviors. For this purpose, under deep analyzing the association between attack intention and network configuration information, a network security situation evaluation method based on attack intention recognition was proposed. Unlike traditional method, the evaluation method was based on intruder. This method firstly made causal analysis of attack event and discovered intrusion path to recognize every attack stages, then realized situation evaluation based on the attack stages. Lastly the method recognized the attack intention of next stage to forecast network security situation based on achieved attack stages, combined with vulnerability and network connectivity. A simulation experiments for the proposed network security situation evaluation model is performed by network examples. The experimental results show that this method is more accurate on reflecting the truth of attack. And the method does not need training on the historical sequence, so the method is more effective on situation forecasting.
引用
收藏
页码:919 / 924
页数:6
相关论文
共 50 条
  • [21] Network Security Situation Prediction Method Based on MEA-BP
    Xiao, Pu
    Xian, Ming
    Wang, Huimei
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [22] Network security situation abnormal detection method based on hypothesis test
    Wen, Zhicheng
    He, Pinjie
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2016, 16 (03) : 505 - 518
  • [23] A prediction method of network security situation based on QPSO-SVM
    Zhang J.-A.
    Luo H.
    1600, North Atlantic University Union NAUN (14): : 815 - 820
  • [24] An efficient method for network security situation assessment
    Tao, Xiaoling
    Kong, Kaichuan
    Zhao, Feng
    Cheng, Siyan
    Wang, Sufang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (11)
  • [25] Network Security Evaluation Method via Attack Graphs and Fuzzy Cognitive Maps
    Diamah, Aodah
    Mohammadian, Masoud
    Balachandran, Bala M.
    INTELLIGENT DECISION TECHNOLOGIES (IDT'2012), VOL 2, 2012, 16 : 433 - 440
  • [26] An Intention Recognition Method Based on Bayesian Network for UAV Formation in Confrontation
    Yang, Ruochu
    Gao, Huibin
    Wu, Xiande
    Feng, Yijun
    PROCEEDINGS OF 2022 INTERNATIONAL CONFERENCE ON AUTONOMOUS UNMANNED SYSTEMS, ICAUS 2022, 2023, 1010 : 2799 - 2809
  • [27] A robust target intention recognition method based on dynamic bayesian network
    Xiao, Qunli
    Liu, Yuanna
    Deng, Xinyang
    Jiang, Wen
    PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 6846 - 6851
  • [28] Research on computer network security evaluation based on image recognition and neural network
    Wang, Zilong
    Shi, Lin
    Chen, Ning
    Chen, Jie
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (01)
  • [29] Prediction Model of Network Security Situation Based on Regression Analysis
    Xia Wei-wei
    Wang Hai-feng
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 616 - 619
  • [30] Evaluation and Prediction of Power Information Network Security Situation Based on Data Fusion
    Zhang, Xiaolu
    Cui, Lei
    Shen, Wuqiang
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 92 - 97