Network Security Situation Assessment Ecurity Based on the Associated Diffusion Analysis

被引:0
作者
Cai, Xiangdong [1 ,3 ]
Wang, Yuran [1 ]
Zhang, Fushuai [1 ]
yi, Yangjing [2 ]
机构
[1] Harbin Univ Sci & Technol, Sch Automat, Harbin 150080, Heilongjiang, Peoples R China
[2] Harbin Engn Univ, Harbin 150001, Heilongjiang, Peoples R China
[3] Harbin Univ Sci & Technol, Harbin 150080, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2014年 / 8卷 / 01期
关键词
network security; situation evaluation; correlation analysis; spread analysis; attack intention;
D O I
10.14257/ijsia.2014.8.1.34
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The abstract is to be aiming at the complex security situation, situation assessment through a comprehensive analysis of the conclusions drawn generalization to ease management staff awareness and response pressure. Analysis of a number of typical characteristics and lack of assessment methods, we propose a conversion to right harm, dangerous and spread overlay analysis assessment model as the core of the vector, Aims correlation within the network point of view, more thorough, more accurately reveal the security situation. Describes the data, services due authorization, depending on the association occurs, discussed attacking position, risk measure, as well as the superposition of effects coordinated attack. From the point of view of the invasion, the attacker through security breaches or theft of fake login authorization, illegal operation of various resources, directly against the data, services, confidentiality, integrity, availability, and then pass along the dependencies harm, causing wider ramifications indirect losses. From the potential risks, dynamic threats, permanent loss of three levels starting assessed value of each component of the momentum, using the overlay method and clustering method to speculate attacks intended, identify coordinated attack and guiding automatic defense. At last, using with experiments to validate and assess. This model adaptable well, and it's able to draw more precise conclusions credible assessment.
引用
收藏
页码:363 / 371
页数:9
相关论文
共 50 条
  • [31] An ISM-based Analysis Method on the Influencing Factors of Network Security Situation (NSS)
    Xiao, Bing
    Lan, Yanyong
    Zhao, Huiming
    Wu, Xiaolin
    Liu, Weibin
    [J]. JOURNAL OF INTERCONNECTION NETWORKS, 2022, 22 (SUPP02)
  • [32] Assessment of Network Security Policy Based on Security Capability
    Tang, Chenghua
    Yu, Shunzheng
    [J]. 2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1204 - 1208
  • [33] Representation of Network Security Situation Elements Based on Cloud Model
    Kou Guang
    Yang Haopu
    Wang Kun
    Zhang Yuchen
    Wang Shuo
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 215 - 224
  • [34] Research on Situation Evaluation Based on Artificial Immune for Network Security
    Zhang, Ruirui
    Xiao, Xin
    [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 4926 - 4930
  • [35] Antibody Concentration Based Method for Network Security Situation Awareness
    Sun, Feixian
    Xu, Feng
    [J]. 2009 3RD INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICAL ENGINEERING, VOLS 1-11, 2009, : 130 - 133
  • [36] Network Security Situation Awareness Based on Intercepting the Threat Spread
    Zhou, Bo
    Zhong, Lin-fei
    [J]. 2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 876 - 879
  • [37] A Network Security Situation Awareness Model Based on Artificial Immune
    Zhang Ruirui
    Xiao Xin
    [J]. ARCHITECTURE AND BUILDING MATERIALS, PTS 1 AND 2, 2011, 99-100 : 1218 - 1221
  • [38] Network Security Situation Evaluation Based on Modified D-S Evidence Theory
    WANG Chundong
    ZHANG YuKey
    [J]. WuhanUniversityJournalofNaturalSciences, 2014, 19 (05) : 409 - 416
  • [39] A Method Of Network Security Situation Prediction Based on Gray Neural Network Model
    Nian, Liu
    Geng, Li
    Yong, Liu
    [J]. ADVANCED RESEARCH ON MECHANICAL ENGINEERING, INDUSTRY AND MANUFACTURING ENGINEERING, PTS 1 AND 2, 2011, 63-64 : 936 - +
  • [40] Analysis of Mobile Communication Network Security Situation Based on Multi-factor Node Evaluation
    Shang Yanwei
    Lin Xijun
    Huang Xiaobo
    [J]. 2018 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND INFORMATION TECHNOLOGY (ICEMIT 2018), 2018, : 1367 - 1371