Network Situation Risk Assessment Based on Vulnerability Correlation Analysis

被引:1
|
作者
Nan, Xinmeng [1 ]
Chen, Ruiqi [1 ]
Tian, Hongtao [2 ]
Liu, Yupeng [3 ]
机构
[1] Xian Modern Control Technol Res Inst, Xian, Peoples R China
[2] China Unicom Xian Branch, Xian, Peoples R China
[3] Unit 32381 PLA, Beijing, Peoples R China
关键词
situation assessment; vulnerability correlation; risk assessment;
D O I
10.1109/PIC53636.2021.9687007
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
For the question that situation assessment methods for the analysis of existing vulnerabilities are associated with the lack of analysis of vulnerability assessments, which leads to the poor accuracy assessment, the paper presents a method for network vulnerabilities associated with risk assessment situation analysis. The method improves the existing hierarchical network situation assessment, with the system being divided into three levels, which are loopholes at the bottom, host in the middle, and network system at the top. Based on the security risk indices, we calculate the vulnerability, the host, the entire network system risk index, and evaluate and analyze the security posture of the entire network, to solve the problem of inaccurate assessment. The experiments show that the method improves the accuracy of the assessment of network situation assessment greatly.
引用
收藏
页码:330 / 334
页数:5
相关论文
共 50 条
  • [1] A novel network risk assessment method based on vulnerability correlation graph
    Liu Guqing
    Wang Xintong
    Yang Jungang
    Kang Jie
    [J]. 2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 31 - 34
  • [2] Research on Network Risk Situation Assessment Based on Threat Analysis
    Lv Huiying
    Cao Yuanda
    [J]. ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 2, 2008, : 252 - +
  • [3] Network security risk assessment and situation analysis
    Liu Mixia
    Yu Dongmei
    Zhang Qiuyu
    Zhu Honglei
    [J]. 2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 447 - +
  • [4] Flood risk cascade analysis and vulnerability assessment of watershed based on Bayesian network
    Zhang, Wen
    Liu, Gengyuan
    Chiaka, Jeffrey Chiwuikem
    Yang, Zhifeng
    [J]. JOURNAL OF HYDROLOGY, 2023, 626
  • [5] A Vulnerability Risk Assessment Method Based on Heterogeneous Information Network
    Wang, Wenrui
    Shi, Fan
    Zhang, Min
    Xu, Chengxi
    Zheng, Jinghua
    [J]. IEEE ACCESS, 2020, 8 : 148315 - 148330
  • [6] Network Security Risk Assessment Based on Node Correlation
    Wang, Zengguang
    Lu, Yu
    Li, Jindong
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [7] Regional land subsidence vulnerability assessment based on grey correlation analysis
    Chen, Yu
    Shu, Longcang
    [J]. PROGRESS IN CIVIL ENGINEERING, PTS 1-4, 2012, 170-173 : 1265 - 1268
  • [8] Network Situation Assessment Based on RST
    Zhuo, Ying
    Zhang, Qiang
    Gong, Zhenghu
    [J]. PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 480 - 484
  • [9] Network Security Risk Assessment Model and Method Based on Situation Awareness and CORAS
    Qi, Yong
    Wang, Yan
    Li, Qianmu
    [J]. INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2012, 127 : 191 - 204
  • [10] Network Security Situation Assessment Ecurity Based on the Associated Diffusion Analysis
    Cai, Xiangdong
    Wang, Yuran
    Zhang, Fushuai
    yi, Yangjing
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 363 - 371