Security Evaluation of Hosts Based on Network Traffic

被引:0
|
作者
Gao, Cuixia [1 ]
Li, Zhitang [1 ]
Chen, Lin [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
关键词
security evaluation; network traffic;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Malicious behavior will lead to abnormal network traffic patterns. This paper presents a network traffic based method to evaluate the security situation of hosts. A group of variables that can reflect the network traffic feature in a fixed time window are selected as the evaluation metrics. Based on the large samples, we report on a preliminary proof-of-concept approach, that's logistic regression Analysis, to evaluate the probability of host that run into insecure status. The evaluation results are regarded as the normalized abnormality value to evaluate the network traffic of hosts. Experiments and testing show that this method can reasonably evaluate the host network abnormal traffic.
引用
收藏
页码:901 / 905
页数:5
相关论文
共 50 条
  • [1] Security evaluation method based on real time traffic of hosts
    Yao, Tingting
    Zheng, Qinghua
    Guan, Xiaohong
    Chen, Xiuzhen
    [J]. Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2006, 40 (04): : 415 - 419
  • [2] Manipulation of Network Traffic Traces for Security Evaluation
    Gadelrab, Mohammed
    El Kalam, Anas Abou
    Deswarte, Yves
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 1124 - +
  • [3] Network Security: Approach Based on Network Traffic Prediction
    Thakare, Sheetal
    Pund, Anshuman
    Pund, M. A.
    [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 41 - 55
  • [4] Research on the design of network security situation sensor based on network traffic
    Yue, Peng
    Zhao, Limin
    [J]. Boletin Tecnico/Technical Bulletin, 2017, 55 (07): : 554 - 561
  • [5] The Study on Network Security Strategy based on Security Evaluation
    Bi, Yan
    [J]. COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 446 - 450
  • [6] Network Security Detection Method Based on Abnormal Traffic Detection
    Xiao, Tao
    Ke, Yang
    Hu, Yiwen
    Wang, Hongya
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 1093 - 1103
  • [7] Security evaluation of computer network based on hierarchy
    Wen, Linbin
    [J]. International Journal of Network Security, 2019, 21 (05): : 735 - 740
  • [8] Network Security Architecture Based on Vulnerability Evaluation
    Li, June
    Wang, Tongqing
    Zhou, Dongru
    [J]. ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 104 - 109
  • [9] Attack graph based evaluation of network security
    Kotenko, Igor
    Stepashkin, Mikhail
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
  • [10] Computer network security evaluation model based on neural network
    Li, Xinwei
    Chen, Hui
    Ariann, Bryan
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (01) : 71 - 78