Network Situation Risk Assessment Based on Vulnerability Correlation Analysis

被引:1
作者
Nan, Xinmeng [1 ]
Chen, Ruiqi [1 ]
Tian, Hongtao [2 ]
Liu, Yupeng [3 ]
机构
[1] Xian Modern Control Technol Res Inst, Xian, Peoples R China
[2] China Unicom Xian Branch, Xian, Peoples R China
[3] Unit 32381 PLA, Beijing, Peoples R China
来源
PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC) | 2021年
关键词
situation assessment; vulnerability correlation; risk assessment;
D O I
10.1109/PIC53636.2021.9687007
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
For the question that situation assessment methods for the analysis of existing vulnerabilities are associated with the lack of analysis of vulnerability assessments, which leads to the poor accuracy assessment, the paper presents a method for network vulnerabilities associated with risk assessment situation analysis. The method improves the existing hierarchical network situation assessment, with the system being divided into three levels, which are loopholes at the bottom, host in the middle, and network system at the top. Based on the security risk indices, we calculate the vulnerability, the host, the entire network system risk index, and evaluate and analyze the security posture of the entire network, to solve the problem of inaccurate assessment. The experiments show that the method improves the accuracy of the assessment of network situation assessment greatly.
引用
收藏
页码:330 / 334
页数:5
相关论文
共 13 条
  • [1] Ammann P, 2005, 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P64
  • [2] Chen X, 2018, J SOFTWARE, V17, P885
  • [3] Jajodia S, 2010, ADV INFORM SECUR, V46, P139, DOI 10.1007/978-1-4419-0140-8_7
  • [4] Kavitha T., 2010, J INF ASSUR SECUR, V5, P31
  • [5] Lei J, 2008, RES NETWORK SECURITY
  • [6] 软件与网络安全研究综述
    刘剑
    苏璞睿
    杨珉
    和亮
    张源
    朱雪阳
    林惠民
    [J]. 软件学报, 2018, 29 (01) : 42 - 68
  • [7] [刘雅辉 Liu Yahui], 2015, [计算机研究与发展, Journal of Computer Research and Development], V52, P229
  • [8] Nessus product family, NESS PROD FAM
  • [9] Ortalo R, 1997, INFORM SYSTEMS SECUR
  • [10] Peng J., 2011, Comput. Digit. Eng, V39, P121