Real-time Risk Assessment Based on Hidden Markov Model and Security Configuration

被引:0
|
作者
Ding Yu-Ting [1 ]
Qu Hai-Peng [1 ]
Teng Xi-Long [1 ]
机构
[1] Ocean Univ China, Coll Informat Sci & Engn, Dept Comp Sci, Qingdao, Peoples R China
关键词
risk assessment; internal threats; real-time matrix; hidden Markov model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the existing risk assessment methods are generally limited to external factors and ignore internal factors. Here we introduce a real-time method to network risk assessment that takes both external and internal factors into consideration. First, we apply intrusion detection system and configuration verification system to detect external and internal threats respectively. Then, to speculate system changes, a matrix that combines external and internal threats is added to hidden Markov models. Finally, new state transition probability matrices are automatically generated based on the changes, which remedies the deficiency of static transition matrix in the original models. Experimental results show that the improved algorithm can improve the accuracy and reliability of assessment results.
引用
收藏
页码:1599 / +
页数:2
相关论文
共 50 条
  • [1] Real-time threat assessment based on hidden Markov models
    Theodosiadou, Ourania
    Chatzakou, Despoina
    Tsikrika, Theodora
    Vrochidis, Stefanos
    Kompatsiaris, Ioannis
    [J]. RISK ANALYSIS, 2023, 43 (10) : 2069 - 2081
  • [2] Hidden Markov Model Based Real Time Network Security Quantification Method
    Li, Weiming
    Guo, Zhengbiao
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 94 - 100
  • [3] Multisensor real-time risk assessment using continuous-time hidden Markov models
    Haslum, Kjetil
    Arnes, Andre
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1536 - 1540
  • [4] Multisensor real-time risk assessment using continuous-time hidden Markov models
    Haslum, Kjetil
    Arnes, Andr
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 694 - 703
  • [5] Real-time traffic anomaly detection based on Gaussian mixture model and hidden Markov model
    Liang, Guojun
    Kintak, U.
    Chen, Jianbin
    Jiang, Zhiying
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021,
  • [6] A model for real-time failure prognosis based on hidden Markov model and belief rule base
    Zhou, Zhi-Jie
    Hu, Chang-Hua
    Xu, Dong-Ling
    Chen, Mao-Yin
    Zhou, Dong-Hua
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2010, 207 (01) : 269 - 283
  • [7] A Topic-Based Hidden Markov Model for Real-Time Spam Tweets Filtering
    Washha, Mahdi
    Qaroush, Aziz
    Mezghani, Manel
    Sedes, Florence
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 833 - 843
  • [8] Risk Assessment of IT Projects Based on Hidden Markov Model
    Wu, F. T.
    Mao, M. Z.
    Xiao, Z. L.
    [J]. INTERNATIONAL CONFERENCE ON ADVANCES IN MANAGEMENT ENGINEERING AND INFORMATION TECHNOLOGY (AMEIT 2015), 2015, : 150 - 158
  • [9] Real-Time Risk Assessment of Network Security Based on Attack Graphs
    Yin, Xiaochuan
    Fang, Yan
    Liu, Yibo
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMPUTER APPLICATIONS (ICSA 2013), 2013, 92 : 75 - 80
  • [10] Knowledge Based Framework for Real-Time Risk Assessment of Information Security Inspired by Danger Model
    Hu, Zhi-Hua
    Ding, Yong-Sheng
    Huang, Jing-Wen
    [J]. SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 91 - +