A Novel Approach to Network Security Situation Assessment Based on Attack Confidence

被引:3
|
作者
Liu, Donghang [1 ,2 ]
Dong, Lihua [1 ]
Lv, Shaoqing [3 ]
Dong, Ying [2 ]
He, Fannv [2 ]
Wu, Chensi [2 ]
Zhang, Yuqing [2 ]
Ma, Hua [4 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Network, Xian, Shaanxi, Peoples R China
[2] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing, Peoples R China
[3] Xian Univ Posts & Telecommun, Shaanxi Key Lab Informat Commun Network & Secur, Xian, Shaanxi, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
来源
NETWORK AND SYSTEM SECURITY | 2017年 / 10394卷
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Network security situation assessment; Attack confidence; Ensemble learning; D-S evidence theory; Information fusion;
D O I
10.1007/978-3-319-64701-2_33
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an active topic in the research field, network security situation assessment can reflect the security situation from a global perspective. However, existing assessment approaches rely on detection threshold to make decisions, leading to massive false positives and false negatives. This paper proposes a confidence-based network security situation assessment approach that preserves the probability information in attack detection. We use the ensemble learning algorithm and D-S evidence theory to obtain the attack confidence, and calculate the network security situation value through the situation elements fusion. Experiment results demonstrate that this approach is effective and accurate.
引用
收藏
页码:450 / 463
页数:14
相关论文
共 50 条
  • [1] Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model
    Liu, Jianyi
    Weng, Fangyu
    Zhang, Ru
    Guo, Yunbiao
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 161 - 173
  • [2] A Network Security Situation Assessment Method Based On Attack Intention Perception
    Kou Guang
    Tang Guangming
    Ding Xia
    Wang Shuo
    Wang Kun
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1138 - 1142
  • [3] Network security situation assessment with network attack behavior classification
    Yang, Hongyu
    Zhang, Zixin
    Xie, Lixia
    Zhang, Liang
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (10) : 6909 - 6927
  • [4] Quantitative Method for Network Security Situation Based on Attack Prediction
    Hu, Hao
    Zhang, Hongqi
    Liu, Yuling
    Wang, Yongwei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [5] Researches on network security situation analysis based on attack states
    Lv, Huiying
    Cao, Yuanda
    Shi, Cuixia
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 640 - 646
  • [6] Network Security Situation Assessment Based on HMM
    Zhang, Boyun
    Chen, Zhigang
    Wang, Shulin
    Yan, Xiai
    Zhang, Dingxing
    Fan, Qiang
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 387 - +
  • [7] Network Security Situation Assessment Based on FAHP
    Ji Feng-zhu
    Zhou Yun-ting
    Tang Qi-jie
    Hu Fang-xiang
    Ma Shao-feng
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 1629 - 1634
  • [8] Network Security Situation Assessment Methods and Tactics Based on Multivariate Spatiotemporal Attack Graph Model
    Zhou, Anshun
    Huo, Mingde
    [J]. 20TH INT CONF ON UBIQUITOUS COMP AND COMMUNICAT (IUCC) / 20TH INT CONF ON COMP AND INFORMATION TECHNOLOGY (CIT) / 4TH INT CONF ON DATA SCIENCE AND COMPUTATIONAL INTELLIGENCE (DSCI) / 11TH INT CONF ON SMART COMPUTING, NETWORKING, AND SERV (SMARTCNS), 2021, : 541 - 548
  • [9] Network Information Security Situation Assessment Based on Bayesian Network
    Wang Xing-zhu
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 129 - 137
  • [10] Network Security Situation Evaluation Method Based on Attack Intention Recognition
    Wang Kun
    Qiu Hui
    Yang Haopu
    Hou Di
    [J]. PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 919 - 924