Network Security Situation Assessment Ecurity Based on the Associated Diffusion Analysis

被引:0
作者
Cai, Xiangdong [1 ,3 ]
Wang, Yuran [1 ]
Zhang, Fushuai [1 ]
yi, Yangjing [2 ]
机构
[1] Harbin Univ Sci & Technol, Sch Automat, Harbin 150080, Heilongjiang, Peoples R China
[2] Harbin Engn Univ, Harbin 150001, Heilongjiang, Peoples R China
[3] Harbin Univ Sci & Technol, Harbin 150080, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2014年 / 8卷 / 01期
关键词
network security; situation evaluation; correlation analysis; spread analysis; attack intention;
D O I
10.14257/ijsia.2014.8.1.34
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The abstract is to be aiming at the complex security situation, situation assessment through a comprehensive analysis of the conclusions drawn generalization to ease management staff awareness and response pressure. Analysis of a number of typical characteristics and lack of assessment methods, we propose a conversion to right harm, dangerous and spread overlay analysis assessment model as the core of the vector, Aims correlation within the network point of view, more thorough, more accurately reveal the security situation. Describes the data, services due authorization, depending on the association occurs, discussed attacking position, risk measure, as well as the superposition of effects coordinated attack. From the point of view of the invasion, the attacker through security breaches or theft of fake login authorization, illegal operation of various resources, directly against the data, services, confidentiality, integrity, availability, and then pass along the dependencies harm, causing wider ramifications indirect losses. From the potential risks, dynamic threats, permanent loss of three levels starting assessed value of each component of the momentum, using the overlay method and clustering method to speculate attacks intended, identify coordinated attack and guiding automatic defense. At last, using with experiments to validate and assess. This model adaptable well, and it's able to draw more precise conclusions credible assessment.
引用
收藏
页码:363 / 371
页数:9
相关论文
共 50 条
[21]   Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process [J].
Huan Wang ;
Zhanfang Chen ;
Xin Feng ;
Xiaoqiang Di ;
Dan Liu ;
Jianping Zhao ;
Xin Sui .
Wireless Personal Communications, 2018, 102 :1401-1420
[22]   Assessment of Network Security Situation of Industrial Control System Based on CG-ELM [J].
Quan, Hengzhi ;
Zhang, Ji ;
Sun, Yining ;
Bu, Fan ;
Chen, Xinwei .
2023 2ND CONFERENCE ON FULLY ACTUATED SYSTEM THEORY AND APPLICATIONS, CFASTA, 2023, :925-930
[23]   Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process [J].
Wang, Huan ;
Chen, Zhanfang ;
Feng, Xin ;
Di, Xiaoqiang ;
Liu, Dan ;
Zhao, Jianping ;
Sui, Xin .
WIRELESS PERSONAL COMMUNICATIONS, 2018, 102 (02) :1401-1420
[24]   A Model of Network Security Situation Assessment Based on BPNN Optimized by SAA-SSA [J].
Zhang, Ran ;
Pan, Zhihan ;
Yin, Yifeng ;
Cai, Zengyu .
INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2022, 14 (02)
[25]   On Network Security Situation Prediction Based on RBF Neural Network [J].
Jiang, Yang ;
Li, Cheng-hai ;
Yu, Li-shan ;
Bao, Bo .
PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, :4060-4063
[26]   Network Security Situation Evaluation Method Based on Attack Intention Recognition [J].
Wang Kun ;
Qiu Hui ;
Yang Haopu ;
Hou Di .
PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, :919-924
[27]   Modeling and Analysis of Network Security Situation Prediction Based on Covariance Likelihood Neural [J].
Tang, Chenghua ;
Wang, Xin ;
Zhang, Reixia ;
Xie, Yi .
BIO-INSPIRED COMPUTING AND APPLICATIONS, 2012, 6840 :71-+
[28]   RETRACTED: Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction [J].
Pu Zaiyi .
JOURNAL OF SUPERCOMPUTING, 2020, 76 (02) :1342-1357
[29]   The Research of the Network Security Situation Prediction mechanism Based on the complex network [J].
Sun, Shouxin .
2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, :1183-1187
[30]   A Quantitative Model for Network Security Situation Awareness Based on Immunity and Grey Theory [J].
Shi, Yuanquan ;
Li, Tao ;
Chen, Wen ;
Zhang, Ruirui .
2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, :14-18