Skip to main content

2016 | OriginalPaper | Buchkapitel

A Method of Network Security Situation Assessment Based on Hidden Markov Model

verfasst von : Shuang Xiang, Yanli Lv, Chunhe Xia, Yuanlong Li, Zhihuan Wang

Erschienen in: Computational Intelligence and Intelligent Systems

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the network security situation assessment based on hidden Markov model, the establish of state transition matrix is the key to the accuracy of the impact assessment. The state transition matrix is often given based on experience. However, it often ignores the current status of the network. In this paper,based on the game process between the security incidents and protect measures,we improve the efficiency of the state transition matrix by considering the defense efficiency. Comparative experiments show the probability of the network state generated by improved algorithm is more reasonable in network security situation assessment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bass, T.: Multisensor data fusion for next generation distributed intrusion detection systems (1999) Bass, T.: Multisensor data fusion for next generation distributed intrusion detection systems (1999)
2.
Zurück zum Zitat Bass, T.: Intrusion detection systems and multisensor data fusion. Commun. ACM 43(4), 99–105 (2000)CrossRef Bass, T.: Intrusion detection systems and multisensor data fusion. Commun. ACM 43(4), 99–105 (2000)CrossRef
3.
Zurück zum Zitat Xz, C., et al.: Quantitative hierarchical threat evaluation model for network security. J. Softw. 17(4), 885–897 (2006)CrossRef Xz, C., et al.: Quantitative hierarchical threat evaluation model for network security. J. Softw. 17(4), 885–897 (2006)CrossRef
4.
Zurück zum Zitat Xiuzhen, X., et al.: Study on evaluation for security situation of networked system. J. Xi’An Jiaotong Univ. 38(4), 404–408 (2004) Xiuzhen, X., et al.: Study on evaluation for security situation of networked system. J. Xi’An Jiaotong Univ. 38(4), 404–408 (2004)
5.
Zurück zum Zitat Ning, P., et al.: Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. (TISSEC) 7(2), 274–318 (2004)CrossRefMathSciNet Ning, P., et al.: Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. (TISSEC) 7(2), 274–318 (2004)CrossRefMathSciNet
6.
Zurück zum Zitat Xu, D., Ning, P.: Alert correlation through triggering events and common resources. In: 20th Annual Computer Security Applications Conference. IEEE (2004) Xu, D., Ning, P.: Alert correlation through triggering events and common resources. In: 20th Annual Computer Security Applications Conference. IEEE (2004)
7.
Zurück zum Zitat Yong, Z., et al.: Network security situation awareness approach based on Markov game model. J. Softw. 22(3), 009 (2011) Yong, Z., et al.: Network security situation awareness approach based on Markov game model. J. Softw. 22(3), 009 (2011)
8.
Zurück zum Zitat Årnes, A., Valeur, F., Vigna, G., Kemmerer, R.A.: Using Hidden Markov Models to evaluate the risks of intrusions. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 145–164. Springer, Heidelberg (2006)CrossRef Årnes, A., Valeur, F., Vigna, G., Kemmerer, R.A.: Using Hidden Markov Models to evaluate the risks of intrusions. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 145–164. Springer, Heidelberg (2006)CrossRef
9.
Zurück zum Zitat Årnes, A., Sallhammar, K., Haslum, K., Brekne, T., Moe, M.E.G., Knapskog, S.J.: Real-time risk assessment with network sensors and intrusion detection systems. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 388–397. Springer, Heidelberg (2005)CrossRef Årnes, A., Sallhammar, K., Haslum, K., Brekne, T., Moe, M.E.G., Knapskog, S.J.: Real-time risk assessment with network sensors and intrusion detection systems. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 388–397. Springer, Heidelberg (2005)CrossRef
10.
Zurück zum Zitat Khosravi-Farmad M, Rezaee R, Harati A, et al.: Network security risk mitigation using Bayesian decision networks. In: 2014 4th International eConference on Computer and Knowledge Engineering (ICCKE), pp. 267–272. IEEE (2014) Khosravi-Farmad M, Rezaee R, Harati A, et al.: Network security risk mitigation using Bayesian decision networks. In: 2014 4th International eConference on Computer and Knowledge Engineering (ICCKE), pp. 267–272. IEEE (2014)
11.
Zurück zum Zitat Rongrong, X., et al.: An improved quantitative evaluation method for network security. Chinese J. Comput. 38(4), 749–758 (2015)MathSciNet Rongrong, X., et al.: An improved quantitative evaluation method for network security. Chinese J. Comput. 38(4), 749–758 (2015)MathSciNet
12.
Zurück zum Zitat Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77(2), 257–286 (1989)CrossRef Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77(2), 257–286 (1989)CrossRef
13.
Zurück zum Zitat Han, R., Zhao, B., Xu, K.: Policy-based integrative network security management system. Comput. Eng. 8, 069 (2009) Han, R., Zhao, B., Xu, K.: Policy-based integrative network security management system. Comput. Eng. 8, 069 (2009)
14.
Zurück zum Zitat Jianfeng, Z.: Graduate School of National University of Defense Technology (2013) Jianfeng, Z.: Graduate School of National University of Defense Technology (2013)
15.
Zurück zum Zitat Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)MATH Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)MATH
Metadaten
Titel
A Method of Network Security Situation Assessment Based on Hidden Markov Model
verfasst von
Shuang Xiang
Yanli Lv
Chunhe Xia
Yuanlong Li
Zhihuan Wang
Copyright-Jahr
2016
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-0356-1_65