Network Security Situation Evaluation Method Based on Attack Intention Recognition

被引:0
|
作者
Wang Kun [1 ]
Qiu Hui [1 ]
Yang Haopu [1 ]
Hou Di [2 ]
机构
[1] Zhengzhou Inst Informat Sci & Technol, Zhengzhou, Peoples R China
[2] Zhengzhou Univ, Zhengzhou, Peoples R China
来源
PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015) | 2015年
关键词
multi-stage attack; situation evaluation; network security; intention recognition; causal analysis;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper analyzed the existing network security situation evaluation methods and discovered that they can't accurately reflect the features of large-scale, synergetic, multi-stage gradually shown by network attack behaviors. For this purpose, under deep analyzing the association between attack intention and network configuration information, a network security situation evaluation method based on attack intention recognition was proposed. Unlike traditional method, the evaluation method was based on intruder. This method firstly made causal analysis of attack event and discovered intrusion path to recognize every attack stages, then realized situation evaluation based on the attack stages. Lastly the method recognized the attack intention of next stage to forecast network security situation based on achieved attack stages, combined with vulnerability and network connectivity. A simulation experiments for the proposed network security situation evaluation model is performed by network examples. The experimental results show that this method is more accurate on reflecting the truth of attack. And the method does not need training on the historical sequence, so the method is more effective on situation forecasting.
引用
收藏
页码:919 / 924
页数:6
相关论文
共 50 条
  • [31] Network Security Risk Assessment Model and Method Based on Situation Awareness and CORAS
    Qi, Yong
    Wang, Yan
    Li, Qianmu
    INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2012, 127 : 191 - 204
  • [32] A Network Security Situation Element Extraction Method Based on Conditional Generative Adversarial Network and Transformer
    Yang, Yu
    Yao, Chengpeng
    Yang, Jinwei
    Yin, Kun
    IEEE ACCESS, 2022, 10 : 107416 - 107430
  • [33] Network Security Situation Assessment Based on HMM
    Zhang, Boyun
    Chen, Zhigang
    Wang, Shulin
    Yan, Xiai
    Zhang, Dingxing
    Fan, Qiang
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 387 - +
  • [34] Research on Intention Recognition Method Based on Radial Basis Function Neural Network
    Yan, Han
    Ming, Han
    Yang, Ruoxi
    Li, Tiejun
    INFORMATION TECHNOLOGY AND CONTROL, 2019, 48 (04): : 637 - 647
  • [35] Network Security Metric Based on Attack Duration
    Forghani, Shahab
    Habibi, Navid
    Firoozbakht, Mohsen
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 1093 - 1096
  • [36] On Network Security Situation Prediction Based on RBF Neural Network
    Jiang, Yang
    Li, Cheng-hai
    Yu, Li-shan
    Bao, Bo
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 4060 - 4063
  • [37] Network Security Situation Assessment Ecurity Based on the Associated Diffusion Analysis
    Cai, Xiangdong
    Wang, Yuran
    Zhang, Fushuai
    yi, Yangjing
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 363 - 371
  • [38] Network Attack Chain Security Model Construction Based On Attack Framework
    Hu, Jian
    Wang, Hailin
    Li, Hanruo
    JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (04) : 116 - 127
  • [39] An ISM-based Analysis Method on the Influencing Factors of Network Security Situation (NSS)
    Xiao, Bing
    Lan, Yanyong
    Zhao, Huiming
    Wu, Xiaolin
    Liu, Weibin
    JOURNAL OF INTERCONNECTION NETWORKS, 2022, 22 (SUPP02)
  • [40] Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process
    Huan Wang
    Zhanfang Chen
    Xin Feng
    Xiaoqiang Di
    Dan Liu
    Jianping Zhao
    Xin Sui
    Wireless Personal Communications, 2018, 102 : 1401 - 1420