Network Security Risk Assessment Based on Node Correlation

被引:2
|
作者
Wang, Zengguang [1 ]
Lu, Yu [1 ]
Li, Jindong [2 ]
机构
[1] Army Engn Univ, Shijiazhuang Campus, Shijiazhuang 050003, Hebei, Peoples R China
[2] 69225 Army, Hejing 841300, Peoples R China
关键词
D O I
10.1088/1742-6596/1069/1/012073
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A network security risk assessment method based on node correlation is proposed in order to solve the problem that little consideration is given to node correlation and diversity in tradition network security risk assessments. This method which is based on Hidden Markov model quantifies security risk of the node through indirect risks caused by the direct risks and correlations of nodes. Combined the security risk and the importance of the node, the overall risk of the target network is calculated. This method can evaluate network security risk more accurately and provide basis for the formulation of network security policy.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Correlation based Node Behavior Profiling for Enterprise Network Security
    Chang, Su
    Daniels, Thomas E.
    [J]. 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 298 - 305
  • [2] Network Security Risk Assessment Based on Association Rules
    Cheng, Xiaorong
    Wei, Yan
    Geng, Xin
    [J]. ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1142 - 1145
  • [3] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [4] Network Node Resource Risk Assessment Based on Bayesian Belief Network Model
    Li, Jun
    Liu, YuQiang
    Niu, Yan
    Zhang, Hui
    [J]. PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC), 2018, : 404 - 408
  • [5] A proposal for an agent based security risk assessment in a Community Network
    Saylani, Najib
    [J]. Managing Information in the Digital Economy: Issues & Solutions, 2006, : 733 - 737
  • [6] Security Risk Assessment Based on CRITIC and Improved Neural Network
    Cai, Lijuan
    [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 142 - 147
  • [7] A Logic-based Approach to Network Security Risk Assessment
    Ji, Yi
    Wen, Danyan
    Wang, Haiquan
    Xia, Chunhe
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 9 - +
  • [8] Research on Network Security Risk Assessment Based on Group Consistency
    Liu Xiang-qin
    Chen Xia
    [J]. 2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 425 - 428
  • [9] A Network Security Risk Assessment Framework Based on Game Theory
    He, Wei
    Xia, Chunhe
    Zhang, Cheng
    Ji, Yi
    Ma, Xinyi
    [J]. FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 742 - 746
  • [10] Study on Risk Assessment of Network Security Based on Game Theory
    Xu Yanli
    Wang Lingling
    [J]. ADVANCED MATERIALS SCIENCE AND TECHNOLOGY, PTS 1-2, 2011, 181-182 : 799 - +