Network Security Situation Evaluation Method Based on Attack Intention Recognition

被引:0
|
作者
Wang Kun [1 ]
Qiu Hui [1 ]
Yang Haopu [1 ]
Hou Di [2 ]
机构
[1] Zhengzhou Inst Informat Sci & Technol, Zhengzhou, Peoples R China
[2] Zhengzhou Univ, Zhengzhou, Peoples R China
来源
PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015) | 2015年
关键词
multi-stage attack; situation evaluation; network security; intention recognition; causal analysis;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper analyzed the existing network security situation evaluation methods and discovered that they can't accurately reflect the features of large-scale, synergetic, multi-stage gradually shown by network attack behaviors. For this purpose, under deep analyzing the association between attack intention and network configuration information, a network security situation evaluation method based on attack intention recognition was proposed. Unlike traditional method, the evaluation method was based on intruder. This method firstly made causal analysis of attack event and discovered intrusion path to recognize every attack stages, then realized situation evaluation based on the attack stages. Lastly the method recognized the attack intention of next stage to forecast network security situation based on achieved attack stages, combined with vulnerability and network connectivity. A simulation experiments for the proposed network security situation evaluation model is performed by network examples. The experimental results show that this method is more accurate on reflecting the truth of attack. And the method does not need training on the historical sequence, so the method is more effective on situation forecasting.
引用
收藏
页码:919 / 924
页数:6
相关论文
共 50 条
  • [41] A Network Security Situation Awareness Method Based on Multi-source Information Fusion
    Gao, Yue
    Zhang, Shuying
    PROCEEDINGS OF THE 2ND INTERNATIONAL FORUM ON MANAGEMENT, EDUCATION AND INFORMATION TECHNOLOGY APPLICATION (IFMEITA 2017), 2017, 130 : 273 - 276
  • [42] WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization
    赖积保
    王慧强
    刘效武
    梁颖
    郑瑞娟
    赵国生
    JournalofComputerScience&Technology, 2008, (02) : 222 - 230
  • [43] WNN-based network security situation quantitative prediction method and its optimization
    Lai, Ji-Bao
    Wang, Hui-Qiang
    Liu, Xiao-Wu
    Liang, Ying
    Zheng, Rui-Juan
    Zhao, Guo-Sheng
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2008, 23 (02) : 222 - 230
  • [44] Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process
    Wang, Huan
    Chen, Zhanfang
    Feng, Xin
    Di, Xiaoqiang
    Liu, Dan
    Zhao, Jianping
    Sui, Xin
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 102 (02) : 1401 - 1420
  • [45] WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization
    Ji-Bao Lai
    Hui-Qiang Wang
    Xiao-Wu Liu
    Ying Liang
    Rui-Juan Zheng
    Guo-Sheng Zhao
    Journal of Computer Science and Technology, 2008, 23 : 222 - 230
  • [46] A Hierarchical Network Security Risk Assessment Method Based on Vulnerability Attack Link Generated
    Yang, Jungang
    Liang, Li
    Yang, Yanfeng
    Zhu, Guangliang
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 113 - 118
  • [47] Research on Network Security Evaluation System Based on Fuzzy Comprehensive Evaluation Method
    Huang, Xuepeng
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON ECONOMICS, FINANCE AND STATISTICS (ICEFS 2017), 2017, 26 : 361 - 365
  • [48] A stochastic model of maliciel process attack for the evaluation of network security
    Rahmoun, Noureddine
    Chadli, Sara
    Ettifouri, Elhassane
    Saber, Mohammed
    Bouchentouf, Toumi
    2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2014, : 269 - 273
  • [49] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [50] The Research of the Network Security Situation Prediction mechanism Based on the complex network
    Sun, Shouxin
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1183 - 1187