Network Security Situation Assessment Ecurity Based on the Associated Diffusion Analysis

被引:0
|
作者
Cai, Xiangdong [1 ,3 ]
Wang, Yuran [1 ]
Zhang, Fushuai [1 ]
yi, Yangjing [2 ]
机构
[1] Harbin Univ Sci & Technol, Sch Automat, Harbin 150080, Heilongjiang, Peoples R China
[2] Harbin Engn Univ, Harbin 150001, Heilongjiang, Peoples R China
[3] Harbin Univ Sci & Technol, Harbin 150080, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2014年 / 8卷 / 01期
关键词
network security; situation evaluation; correlation analysis; spread analysis; attack intention;
D O I
10.14257/ijsia.2014.8.1.34
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The abstract is to be aiming at the complex security situation, situation assessment through a comprehensive analysis of the conclusions drawn generalization to ease management staff awareness and response pressure. Analysis of a number of typical characteristics and lack of assessment methods, we propose a conversion to right harm, dangerous and spread overlay analysis assessment model as the core of the vector, Aims correlation within the network point of view, more thorough, more accurately reveal the security situation. Describes the data, services due authorization, depending on the association occurs, discussed attacking position, risk measure, as well as the superposition of effects coordinated attack. From the point of view of the invasion, the attacker through security breaches or theft of fake login authorization, illegal operation of various resources, directly against the data, services, confidentiality, integrity, availability, and then pass along the dependencies harm, causing wider ramifications indirect losses. From the potential risks, dynamic threats, permanent loss of three levels starting assessed value of each component of the momentum, using the overlay method and clustering method to speculate attacks intended, identify coordinated attack and guiding automatic defense. At last, using with experiments to validate and assess. This model adaptable well, and it's able to draw more precise conclusions credible assessment.
引用
收藏
页码:363 / 371
页数:9
相关论文
共 50 条
  • [1] Network Security Threat Situation Evaluation Based on Fusion Decision and Spread Analysis
    Cai, Xiangdong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 383 - 388
  • [2] Network Security Threats Situation Assessment and Analysis Technology Study
    Cai, Xiangdong
    Yang Jingyi
    Zhang, Huanyu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 217 - 224
  • [3] Network Security Situation Assessment Based on HMM
    Zhang, Boyun
    Chen, Zhigang
    Wang, Shulin
    Yan, Xiai
    Zhang, Dingxing
    Fan, Qiang
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 387 - +
  • [4] A Network Security Situation Assessment Method Based On Attack Intention Perception
    Kou Guang
    Tang Guangming
    Ding Xia
    Wang Shuo
    Wang Kun
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1138 - 1142
  • [5] Prediction Model of Network Security Situation Based on Regression Analysis
    Xia Wei-wei
    Wang Hai-feng
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 616 - 619
  • [6] Network Security Threats Situation Assessment and Analysis Technology Study
    Cai, Xiangdong
    Zhang, Huanyu
    Li, Tao
    PROCEEDINGS OF 2013 2ND INTERNATIONAL CONFERENCE ON MEASUREMENT, INFORMATION AND CONTROL (ICMIC 2013), VOLS 1 & 2, 2013, : 643 - 646
  • [7] Network Security Situation Assessment Based on Stochastic Game Model
    Zhang, Boyun
    Chen, Zhigang
    Tang, Wensheng
    Fan, Qiang
    Yan, Xiai
    Wang, Shulin
    ADVANCED INTELLIGENT COMPUTING, 2011, 6838 : 517 - +
  • [8] A BIPMU-based network security situation assessment method for wireless network
    Liu, Ziyi
    Yang, Changsong
    Liu, Yueling
    Ding, Yong
    COMPUTER STANDARDS & INTERFACES, 2023, 83
  • [9] Network Security Situation Assessment Method Based on Markov Game Model
    Li, Xi
    Lu, Yu
    Liu, Sen
    Nie, Wei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (05): : 2414 - 2428
  • [10] Network Security Situation Assessment Model Based on GSA-SVM
    Chen, Yu-xin
    Yin, Xiao-chuan
    Sun, Ao
    2018 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND NETWORK TECHNOLOGY (CCNT 2018), 2018, 291 : 414 - 420