Network Situation Risk Assessment Based on Vulnerability Correlation Analysis

被引:1
|
作者
Nan, Xinmeng [1 ]
Chen, Ruiqi [1 ]
Tian, Hongtao [2 ]
Liu, Yupeng [3 ]
机构
[1] Xian Modern Control Technol Res Inst, Xian, Peoples R China
[2] China Unicom Xian Branch, Xian, Peoples R China
[3] Unit 32381 PLA, Beijing, Peoples R China
关键词
situation assessment; vulnerability correlation; risk assessment;
D O I
10.1109/PIC53636.2021.9687007
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
For the question that situation assessment methods for the analysis of existing vulnerabilities are associated with the lack of analysis of vulnerability assessments, which leads to the poor accuracy assessment, the paper presents a method for network vulnerabilities associated with risk assessment situation analysis. The method improves the existing hierarchical network situation assessment, with the system being divided into three levels, which are loopholes at the bottom, host in the middle, and network system at the top. Based on the security risk indices, we calculate the vulnerability, the host, the entire network system risk index, and evaluate and analyze the security posture of the entire network, to solve the problem of inaccurate assessment. The experiments show that the method improves the accuracy of the assessment of network situation assessment greatly.
引用
收藏
页码:330 / 334
页数:5
相关论文
共 50 条
  • [31] Network Efficacy Evaluation Based on AHP for Network Security Situation Assessment
    Yuan, Zhichao
    Yao, Shan
    Xia, Chunhe
    Xiang, Shuang
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 797 - 800
  • [32] Network Situation Assessment Method Based on Improved BP Neural Network
    Du, Zhiqiang
    Yao, Haitao
    Fu, Yanfang
    Cao, Zijian
    Liang, Hongtao
    Ren, Jinkang
    [J]. ELECTRONICS, 2023, 12 (03)
  • [33] The key technology of computer network vulnerability assessment based on neural network
    Shaoqiang Wang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2020
  • [34] The key technology of computer network vulnerability assessment based on neural network
    Wang, Shaoqiang
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [35] THE RESEARCH OF QUANTITATIVE VULNERABILITY ASSESSMENT BASED ON ALERT CORRELATION GRAPHS
    Zhang, Yi
    Zhao, Bao
    Zhao, Kai
    [J]. 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 106 - 111
  • [36] Vulnerability assessment and quantitative risk analysis of road infrastructure
    Spagnuolo, Franco Enzo
    Lombardi, Mara
    Cantisani, Giuseppe
    Guarascio, Massimo
    Rossi, Giuliano
    [J]. GEAM-GEOINGEGNERIA AMBIENTALE E MINERARIA-GEAM-GEOENGINEERING ENVIRONMENT AND MINING, 2018, (155): : 93 - 102
  • [37] REGIONAL HAZARD ANALYSIS FOR USE IN VULNERABILITY AND RISK ASSESSMENT
    Maris, Fotios
    Kitikidou, Kyriaki
    Paparrizos, Spyridon
    Karagiorgos, Konstantinos
    Potouridis, Simeon
    Fuchs, Sven
    [J]. QUAESTIONES GEOGRAPHICAE, 2015, 34 (03) : 77 - 84
  • [38] Security usability principles for vulnerability analysis and risk assessment
    Josang, Audun
    AlFayyadh, Bander
    Grandison, Tyrone
    AlZomai, Mohammed
    McNamara, Judith
    [J]. TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 269 - +
  • [39] Analysis of the global tsunami data for vulnerability and risk assessment
    Nirupama, N.
    [J]. NATURAL HAZARDS, 2009, 48 (01) : 11 - 16
  • [40] Analysis of the global tsunami data for vulnerability and risk assessment
    N. Nirupama
    [J]. Natural Hazards, 2009, 48 : 11 - 16