Skip to main content
Top

2020 | OriginalPaper | Chapter

Intelligent System Security Event Description Method

Authors : Jun Hou, Qianmu Li, Yini Chen, Shunmei Meng, Huaqiu Long, Zhe Sun

Published in: Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In a cloud environment, the control logic and data forwarding of network devices are separated from each other. The control layer is responsible for the centralized management of network nodes. After it acquires the entire network topology, it can automatically generate a visualized network structure. The security analyst can grasp the connection status of the devices on the entire network in the control domain. The network topology generation method based on the control layer information is directly and efficiently, which can greatly simplify the description of security events in the cloud environment. At the same time, the separate structure also makes the specific details of the underlying network device hidden. Petri-net, as a formal description tool, can be used to describe such a structure. Based on the cloud environment structure, this paper combines the advantages of CORAS modeling and analysis with object-oriented Petri-net theory, and proposes a COP (CORAS-based Object Oriented Petri-net)-based intelligent system security event description method. Model the description of the complexity and dynamics of cloud environment security events.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hong, J.E., Bae, D.H.: Software modeling and analysis using a hierarchical object-oriented Petri net. Inf. Sci. Int. J. 130, 131–164 (2000)MATH Hong, J.E., Bae, D.H.: Software modeling and analysis using a hierarchical object-oriented Petri net. Inf. Sci. Int. J. 130, 131–164 (2000)MATH
3.
go back to reference De Oliveira, R.L.S., Shinoda, A.A., Schweitzer, C.M., et al.: Using mininet for emulation and prototyping software-defined networks. In: IEEE Colombian Conference on Communications and Computing, pp. 1–6. IEEE, Bogota (2014) De Oliveira, R.L.S., Shinoda, A.A., Schweitzer, C.M., et al.: Using mininet for emulation and prototyping software-defined networks. In: IEEE Colombian Conference on Communications and Computing, pp. 1–6. IEEE, Bogota (2014)
4.
go back to reference Liu, X., Wang, H., Lai, J., et al.: Multiclass support vector machines theory and its data fusion application in network security situation awareness. In: 2007 International Conference on Wireless Communications, Networking and Mobile Computing, pp. 6349–6352. IEEE, Shanghai (2007) Liu, X., Wang, H., Lai, J., et al.: Multiclass support vector machines theory and its data fusion application in network security situation awareness. In: 2007 International Conference on Wireless Communications, Networking and Mobile Computing, pp. 6349–6352. IEEE, Shanghai (2007)
5.
go back to reference Shin, S., Yegneswaran, V., Porras, P., et al.: AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. In: ACM SIGSAC Conference on Computer & Communications Security, pp. 413–424. ACM (2013) Shin, S., Yegneswaran, V., Porras, P., et al.: AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. In: ACM SIGSAC Conference on Computer & Communications Security, pp. 413–424. ACM (2013)
6.
go back to reference Xu, X., Liu, Q., Zhang, X., Zhang, J., Qi, L., Dou, W.: A blockchain-powered crowdsourcing method with privacy preservation in mobile environment. IEEE Trans. Comput. Soc. Syst. 6(6), 1407–1419 (2019)CrossRef Xu, X., Liu, Q., Zhang, X., Zhang, J., Qi, L., Dou, W.: A blockchain-powered crowdsourcing method with privacy preservation in mobile environment. IEEE Trans. Comput. Soc. Syst. 6(6), 1407–1419 (2019)CrossRef
8.
go back to reference Qi, L., et al.: Finding all you need: web APIs recommendation in web of things through keywords search. IEEE Trans. Comput. Soc. Syst. 6(5), 1063–1072 (2019)CrossRef Qi, L., et al.: Finding all you need: web APIs recommendation in web of things through keywords search. IEEE Trans. Comput. Soc. Syst. 6(5), 1063–1072 (2019)CrossRef
9.
go back to reference Li, Q., Meng, S., Wang, S., Zhang, J., Hou, J.: CAD: command-level anomaly detection for vehicle-road collaborative charging network. IEEE Access 7, 34910–34924 (2019)CrossRef Li, Q., Meng, S., Wang, S., Zhang, J., Hou, J.: CAD: command-level anomaly detection for vehicle-road collaborative charging network. IEEE Access 7, 34910–34924 (2019)CrossRef
10.
go back to reference Li, Q., Meng, S., Zhang, S., Hou, J., Qi, L.: Complex attack linkage decision-making in edge computing networks. IEEE Access 7, 12058–12072 (2019)CrossRef Li, Q., Meng, S., Zhang, S., Hou, J., Qi, L.: Complex attack linkage decision-making in edge computing networks. IEEE Access 7, 12058–12072 (2019)CrossRef
11.
go back to reference Li, Q., et al.: Safety risk monitoring of cyber-physical power systems based on ensemble learning algorithm. IEEE Access 7, 24788–24805 (2019)CrossRef Li, Q., et al.: Safety risk monitoring of cyber-physical power systems based on ensemble learning algorithm. IEEE Access 7, 24788–24805 (2019)CrossRef
12.
go back to reference Li, Q., Wang, Y., Pu, Z., Wang, S., Zhang, W.: A time series association state analysis method in smart internet of electric vehicle charging network attack. Transp. Res. Rec. 2673, 217–228 (2019)CrossRef Li, Q., Wang, Y., Pu, Z., Wang, S., Zhang, W.: A time series association state analysis method in smart internet of electric vehicle charging network attack. Transp. Res. Rec. 2673, 217–228 (2019)CrossRef
Metadata
Title
Intelligent System Security Event Description Method
Authors
Jun Hou
Qianmu Li
Yini Chen
Shunmei Meng
Huaqiu Long
Zhe Sun
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-48513-9_39

Premium Partner