I-HMM-Based Multidimensional Network Security Risk Assessment

被引:9
|
作者
Hu, Jingjing [1 ]
Guo, Shuangshuang [1 ]
Kuang, Xiaohui [2 ]
Meng, Fankun [1 ]
Hu, Dongsheng [1 ]
Shi, Zhiyu [1 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100101, Peoples R China
基金
中国国家自然科学基金;
关键词
Hidden Markov model; network node correlation; network security risk; risk assessment; KEY MANAGEMENT SCHEME; COVERT CHANNEL; AGREEMENT; ENSEMBLE; MODEL;
D O I
10.1109/ACCESS.2019.2961997
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems (CPS) are vulnerable to network attacks because communication relies on the network that links the various components in the CPS. The importance of network security is self-evident. In this study, we conduct a network security risk assessment from the perspectives of the host and the network, and we propose a new framework for a multidimensional network security risk assessment that includes two stages, i.e., risk identification and risk calculation. For the risk identification stage, we propose a multidimensional hierarchical index system for assessing cybersecurity risk; the system's security status is determined in three dimensions, i.e., basic operation, vulnerabilities, and threats, and these dimensions guide the data collection. In the risk calculation stage, we use a hidden Markov model (HMM) to assess the network security risk. We provide a new definition of the quality of alert and optimize the observation sequence of the HMM. The model uses a learning algorithm instead of setting the parameters manually. We introduce the concept of network node association to increase the reliability and accuracy of the risk assessment. The simulation results show that the proposed index system provides quantitative data that reflect the security status of the network. The proposed network security risk assessment method based on the improved HMM (I-HMM) reflects the security risk status in a timely and intuitive manner and detects the degree of risk that different hosts pose to the network.
引用
收藏
页码:1431 / 1442
页数:12
相关论文
共 50 条
  • [21] A Network Security Risk Assessment Method based on Immunity Algorithm
    Yuan Hao
    [J]. PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 948 - 953
  • [22] Network security risk assessment model based on fuzzy theory
    Yi, Bo
    Cao, Yuan Ping
    Song, Ying
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (04) : 3921 - 3928
  • [23] Risk assessment of power system network security based on RBF neural network
    Yu Y.
    Di C.
    Guo X.
    [J]. International Journal of Power and Energy Conversion, 2023, 14 (2-3) : 148 - 158
  • [24] Information System Security Risk Assessment Based on Multidimensional Cloud Model and The Entropy Theory
    Huang, Liangliang
    Shen, Yongjun
    Zhang, Guidong
    Luo, Huixia
    [J]. PROCEEDINGS OF 2015 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION, 2015, : 11 - 15
  • [25] Fuzzy risk assessment of the network security
    Zhao, Dong-Mei
    Wang, Jing-Hong
    Ma, Jian-Feng
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 4400 - +
  • [26] Research on Network Security Risk Assessment Method Based on Bayesian Reasoning
    Li, Xiangna
    Li, Mengao
    Wang, Hui
    [J]. PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 102 - 108
  • [27] A Method of Risk Assessment of Information Security Based on Artificial Neural Network
    Zhao, D. M.
    Liu, J. X.
    Zu, J. X.
    [J]. ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 246 - 252
  • [28] RISK ASSESSMENT OF DISTRIBUTED NETWORK DATA SECURITY BASED ON SIMHASH ALGORITHM
    Tang, Yanbin
    [J]. International Journal of Industrial Engineering : Theory Applications and Practice, 2024, 31 (05): : 950 - 966
  • [29] A Method for Information Security Risk Assessment Based on the Dynamic Bayesian Network
    Wang, Jiao
    Fan, Kefeng
    Mo, Wei
    Xu, Dongyang
    [J]. PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 279 - 283
  • [30] Risk-based Security Assessment in Distribution Network with the Integration of Photovoltaic
    Sheng, Wanxing
    Liu, Keyan
    Cai, Yating
    Du, Songhuai
    [J]. 2016 ASIA CONFERENCE ON POWER AND ELECTRICAL ENGINEERING (ACPEE 2016), 2016, 55