Network Security Threats Situation Assessment and Analysis Technology Study

被引:0
|
作者
Cai, Xiangdong [1 ]
Zhang, Huanyu [1 ]
Li, Tao [2 ]
机构
[1] Harbin Univ Sci & Technol, Sch Automat, Harbin, Peoples R China
[2] Harbin Far East Inst Technol, Harbin, Peoples R China
关键词
network security; threat evaluation; dependency relationship;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
High level services would suffer threat of varying degrees indirectly from attacks for bottom layer. Most evaluation method applied in current time has not taken the indirect attack into consideration as well as for that of indirect threat and multi-source attack. This paper has proposed a new evaluation method applied upon the crisis and problems based on dependency relationship between bottom layer service and high level services. The dependency relationship is obtained from the management information of the system and monitoring record of network communication, which is applied as the criterion in distinguishing attack directly and indirectly, which is transported over the dependency. On the other hand, the method would fit multi-source attack with non-linear method for evaluation. A general evaluation for the service system would be given based on threat level obtained above. The actual application experiments have proved the feasibilities and practical applicability of the proposed method in the paper.
引用
收藏
页码:643 / 646
页数:4
相关论文
共 50 条
  • [1] Network Security Threats Situation Assessment and Analysis Technology Study
    Cai, Xiangdong
    Yang Jingyi
    Zhang, Huanyu
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 217 - 224
  • [2] Research on Network Security Situation Assessment and Forecasting Technology
    Wang, Hongbin
    Zhao, Dongmei
    Li, Xixi
    [J]. JOURNAL OF WEB ENGINEERING, 2020, 19 (7-8): : 1239 - 1265
  • [3] Network security risk assessment and situation analysis
    Liu Mixia
    Yu Dongmei
    Zhang Qiuyu
    Zhu Honglei
    [J]. 2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 447 - +
  • [4] Assessment of Security Threats via Network Topology Analysis: An Initial Investigation
    Trovati, Marcello
    Thomas, Win
    Sun, Quanbin
    Kontonatsios, Georgios
    [J]. GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 416 - 425
  • [5] Survey of Technology in Network Security Situation Awareness
    Zhang, Junwei
    Feng, Huamin
    Liu, Biao
    Zhao, Dongmei
    [J]. SENSORS, 2023, 23 (05)
  • [6] The Research on Network Security Situation Awareness Technology
    Zhang, Yongmei
    Jia, Yanmei
    Zhong, Jinxiang
    [J]. CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 1321 - 1326
  • [7] Network Security Situation Assessment Ecurity Based on the Associated Diffusion Analysis
    Cai, Xiangdong
    Wang, Yuran
    Zhang, Fushuai
    yi, Yangjing
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 363 - 371
  • [8] An efficient method for network security situation assessment
    Tao, Xiaoling
    Kong, Kaichuan
    Zhao, Feng
    Cheng, Siyan
    Wang, Sufang
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (11):
  • [9] Research on Network Security Situation Assessment Method
    Gao, Yuan
    Wen, Jin
    Chen, Pu
    Wang, Zhiqiang
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 140 - 152
  • [10] Network Security Situation Assessment Based on HMM
    Zhang, Boyun
    Chen, Zhigang
    Wang, Shulin
    Yan, Xiai
    Zhang, Dingxing
    Fan, Qiang
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 387 - +