Network Security Situation Assessment Methods and Tactics Based on Multivariate Spatiotemporal Attack Graph Model

被引:0
|
作者
Zhou, Anshun [1 ]
Huo, Mingde [2 ]
机构
[1] China United Network Commun Corp, Hainan Branch, Haikou, Hainan, Peoples R China
[2] China United Network Commun Corp, Chongqing Branch, Chongqing, Peoples R China
关键词
deep learning; space-time characteristics; attack graph; transition probability; security situation; EDGE;
D O I
10.1109/IUCC-CIT-DSCI-SMARTCNS55181.2021.00090
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In view of the characteristics of large-scale, coordinated and multi-stage network attacks, a network security situation assessment method based on attack Graph model was proposed. Firstly, the network attack behavior characteristics are constructed by integrating the spatio-temporal characteristics of attack events and multi-source alarm data. Secondly, attack nodes are mapped based on alarm information to associate multi-step attack paths. Thirdly, on the basis of constructing the attack Graph, the transfer probability table of attack nodes is constructed combining with the transfer sequence, and the transfer probability is introduced into the attack graph to infer the attack intention of the attacker. Finally, according to the maximum possible attack path, the security situation of attack nodes with high probability is evaluated, and the security situation of potential attack nodes after network attack is scientifically quantified, providing theoretical support and scientific basis for network security management personnel to do a good job of protection in advance.
引用
收藏
页码:541 / 548
页数:8
相关论文
共 50 条
  • [1] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [2] Network Security Risk Assessment Method Based on HMM and Attack Graph Model
    Liu Si-chao
    Liu Yuan
    [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
  • [3] A Network Security Situation Assessment Method Based On Attack Intention Perception
    Kou Guang
    Tang Guangming
    Ding Xia
    Wang Shuo
    Wang Kun
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1138 - 1142
  • [4] A Novel Approach to Network Security Situation Assessment Based on Attack Confidence
    Liu, Donghang
    Dong, Lihua
    Lv, Shaoqing
    Dong, Ying
    He, Fannv
    Wu, Chensi
    Zhang, Yuqing
    Ma, Hua
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 450 - 463
  • [5] Complex Network Security Analysis based on Attack Graph Model
    Liu, Zhiming
    Li, Sheng
    He, Jin
    Xie, Di
    Deng, Zhantao
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
  • [6] Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model
    Liu, Jianyi
    Weng, Fangyu
    Zhang, Ru
    Guo, Yunbiao
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 161 - 173
  • [7] Network security situation assessment with network attack behavior classification
    Yang, Hongyu
    Zhang, Zixin
    Xie, Lixia
    Zhang, Liang
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (10) : 6909 - 6927
  • [8] Dynamic Network Security Situation Prediction based on Bayesian Attack Graph and Big Data
    Lin, Pengwen
    Chen, Yonghong
    [J]. PROCEEDINGS OF 2018 IEEE 4TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2018), 2018, : 992 - 998
  • [9] Research on Network Security Quantitative Model Based on Probabilistic Attack Graph
    Cui, Yimin
    Li, Junmei
    Zhao, Wei
    Luan, Cheng
    [J]. AMCSE 2018 - INTERNATIONAL CONFERENCE ON APPLIED MATHEMATICS, COMPUTATIONAL SCIENCE AND SYSTEMS ENGINEERING, 2019, 24
  • [10] Multiobjective network security dynamic assessment method based on Bayesian network attack graph
    Xie, Jialiang
    Zhang, Shanli
    Wang, Honghui
    Chen, Mingzhi
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2024, 17 (01) : 38 - 60