Network Security Situation Assessment Ecurity Based on the Associated Diffusion Analysis

被引:0
作者
Cai, Xiangdong [1 ,3 ]
Wang, Yuran [1 ]
Zhang, Fushuai [1 ]
yi, Yangjing [2 ]
机构
[1] Harbin Univ Sci & Technol, Sch Automat, Harbin 150080, Heilongjiang, Peoples R China
[2] Harbin Engn Univ, Harbin 150001, Heilongjiang, Peoples R China
[3] Harbin Univ Sci & Technol, Harbin 150080, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2014年 / 8卷 / 01期
关键词
network security; situation evaluation; correlation analysis; spread analysis; attack intention;
D O I
10.14257/ijsia.2014.8.1.34
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The abstract is to be aiming at the complex security situation, situation assessment through a comprehensive analysis of the conclusions drawn generalization to ease management staff awareness and response pressure. Analysis of a number of typical characteristics and lack of assessment methods, we propose a conversion to right harm, dangerous and spread overlay analysis assessment model as the core of the vector, Aims correlation within the network point of view, more thorough, more accurately reveal the security situation. Describes the data, services due authorization, depending on the association occurs, discussed attacking position, risk measure, as well as the superposition of effects coordinated attack. From the point of view of the invasion, the attacker through security breaches or theft of fake login authorization, illegal operation of various resources, directly against the data, services, confidentiality, integrity, availability, and then pass along the dependencies harm, causing wider ramifications indirect losses. From the potential risks, dynamic threats, permanent loss of three levels starting assessed value of each component of the momentum, using the overlay method and clustering method to speculate attacks intended, identify coordinated attack and guiding automatic defense. At last, using with experiments to validate and assess. This model adaptable well, and it's able to draw more precise conclusions credible assessment.
引用
收藏
页码:363 / 371
页数:9
相关论文
共 50 条
  • [21] Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process
    Wang, Huan
    Chen, Zhanfang
    Feng, Xin
    Di, Xiaoqiang
    Liu, Dan
    Zhao, Jianping
    Sui, Xin
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 102 (02) : 1401 - 1420
  • [22] Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process
    Huan Wang
    Zhanfang Chen
    Xin Feng
    Xiaoqiang Di
    Dan Liu
    Jianping Zhao
    Xin Sui
    Wireless Personal Communications, 2018, 102 : 1401 - 1420
  • [23] Assessment of Network Security Situation of Industrial Control System Based on CG-ELM
    Quan, Hengzhi
    Zhang, Ji
    Sun, Yining
    Bu, Fan
    Chen, Xinwei
    2023 2ND CONFERENCE ON FULLY ACTUATED SYSTEM THEORY AND APPLICATIONS, CFASTA, 2023, : 925 - 930
  • [24] A Model of Network Security Situation Assessment Based on BPNN Optimized by SAA-SSA
    Zhang, Ran
    Pan, Zhihan
    Yin, Yifeng
    Cai, Zengyu
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2022, 14 (02)
  • [25] Network Security Situation Evaluation Method Based on Attack Intention Recognition
    Wang Kun
    Qiu Hui
    Yang Haopu
    Hou Di
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 919 - 924
  • [26] Modeling and Analysis of Network Security Situation Prediction Based on Covariance Likelihood Neural
    Tang, Chenghua
    Wang, Xin
    Zhang, Reixia
    Xie, Yi
    BIO-INSPIRED COMPUTING AND APPLICATIONS, 2012, 6840 : 71 - +
  • [27] On Network Security Situation Prediction Based on RBF Neural Network
    Jiang, Yang
    Li, Cheng-hai
    Yu, Li-shan
    Bao, Bo
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 4060 - 4063
  • [28] RETRACTED ARTICLE: Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction
    Pu Zaiyi
    The Journal of Supercomputing, 2020, 76 : 1342 - 1357
  • [29] The Research of the Network Security Situation Prediction mechanism Based on the complex network
    Sun, Shouxin
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1183 - 1187
  • [30] An ISM-based Analysis Method on the Influencing Factors of Network Security Situation (NSS)
    Xiao, Bing
    Lan, Yanyong
    Zhao, Huiming
    Wu, Xiaolin
    Liu, Weibin
    JOURNAL OF INTERCONNECTION NETWORKS, 2022, 22 (SUPP02)