An evaluation method of network security situation using data fusion theory

被引:2
|
作者
Zhao Z. [1 ]
Peng Y. [2 ]
Huang J. [2 ]
Zhou T. [3 ]
Wang H. [2 ]
机构
[1] School of Special Education of Changchun University, 6543 Weixing Road, Changchun
[2] Guangxi University of Science and Technology, 268 Avenue Donghuan, Liuzhou
[3] Affiliated Hospital of Changchun University of Chinese Medicine, 1478 Gongneng Road, Changchun
关键词
Data fusion; Security events; Situation awareness;
D O I
10.23940/ijpe.20.07.p7.10461057
中图分类号
学科分类号
摘要
Network security situation awareness can effectively grasp the macro-security situation of the network, but the evaluation process still face problems such as single data source and big accuracy deviation. Therefore, this paper proposes a network security situation awareness model and method based on D-S theory. Using PCA clustering, the model preprocesses alarm information and eliminates useless alarm information to reduce time costs in evaluation. Based on improved D-S evidence theory, multi-source alarm data fusion rules are established to improve accuracy in event detection. Three situation awareness indicators of vulnerability, threat, and asset importance are set up to quantify the situation indicators and form an intuitive situation display. The experimental comparison analysis indicates that the model proposed herein can accurately assess the network security situation. © 2020 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:1046 / 1057
页数:11
相关论文
共 50 条
  • [11] Network Security Situation Evaluation Method for Distributed Denial of Service
    Fang Fang
    Liang XiaoYan
    Wang Jia
    Tian XueJu
    Zhang Bo
    Huang JiYao
    Su Yuan
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 16 - 21
  • [12] Network Security Threat Situation Evaluation Based on Fusion Decision and Spread Analysis
    Cai, Xiangdong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 383 - 388
  • [13] Research on Information Fusion Method Based on sFlow and Netflow in Network Security Situation
    Wang, Yanbo
    Wang, Huiqiang
    Han, Chengqin
    Ge, Baoyu
    Yu, Ming
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, 2012, 304 : 139 - +
  • [14] A Hierarchical P2P Model and a Data Fusion Method for Network Security Situation Awareness System
    GUO Fangfang
    HU Yibing
    XIU Longting
    FENG Guangsheng
    WANG Shuaishuai
    Wuhan University Journal of Natural Sciences, 2016, 21 (02) : 126 - 132
  • [15] Network awareness of security situation information security measurement method based on data mining
    Wang, Jia
    Zhang, Ke
    Li, Jingyuan
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2024, 46 (01) : 209 - 219
  • [16] Method of Network Security Situation Analysis
    Jin Jin
    Song Jian
    Tian Changhui
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 160 - 163
  • [17] A LSTM-Based Method for Comprehension and Evaluation of Network Security Situation
    Li, Shixuan
    Zhao, Dongmei
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 723 - 728
  • [18] Network Security Situation Evaluation Method Based on Attack Intention Recognition
    Wang Kun
    Qiu Hui
    Yang Haopu
    Hou Di
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 919 - 924
  • [19] A Network Security Situation Awareness Method Based on Multi-source Information Fusion
    Gao, Yue
    Zhang, Shuying
    PROCEEDINGS OF THE 2ND INTERNATIONAL FORUM ON MANAGEMENT, EDUCATION AND INFORMATION TECHNOLOGY APPLICATION (IFMEITA 2017), 2017, 130 : 273 - 276
  • [20] Using Gray Model for the Evaluation Index and Forecast of Network Security Situation
    Zhang, Fengli
    Wang, Juan
    Qin, Zhiguang
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 309 - 313