Skip to main content

2018 | OriginalPaper | Buchkapitel

Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model

verfasst von : Jianyi Liu, Fangyu Weng, Ru Zhang, Yunbiao Guo

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To analyze the influence of threat propagation on network system and accurately evaluate system security, this paper proposes an approach to improve the awareness of network security, based on Attack-Defense Stochastic Game Model (ADSGM). The variety of network security elements collected by multi-sensors are fused into a standard dataset such as assets, threats and vulnerabilities. For every threat, it builds a threat propagation network and propagation rule. By using the game theory to analyze the network offensive and defensive process, it establishes the ADSGM. The ADSGM can dynamically evaluate network security situation and provide the best reinforcement schema. Experimental results on a specific network indicate that the approach is more precise and more suitable for a real network environment. The reinforcement schema can effectively prevent the propagation of threats and reduce security risks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Chen, X., Zheng, Q., et al.: Study on evaluation for security situation of networked systems. J. Xi’an Jiao Tong Univ. 38, 404–408 (2004) Chen, X., Zheng, Q., et al.: Study on evaluation for security situation of networked systems. J. Xi’an Jiao Tong Univ. 38, 404–408 (2004)
3.
Zurück zum Zitat Trusted Computing Group: TCG Specification architecture overview specification revision 1.2. [EB/OL], 15 April 2011 Trusted Computing Group: TCG Specification architecture overview specification revision 1.2. [EB/OL], 15 April 2011
4.
Zurück zum Zitat Trusted Computing Group: TCG Specification Architecture Overview, pp. 5–40. Trusted Computing Group, Oregon (2007) Trusted Computing Group: TCG Specification Architecture Overview, pp. 5–40. Trusted Computing Group, Oregon (2007)
5.
Zurück zum Zitat Xie, L., Wang, Y.: New method of network security situation awareness. J. Beijing Univ. Posts Telecommun. 31–35 (2014) Xie, L., Wang, Y.: New method of network security situation awareness. J. Beijing Univ. Posts Telecommun. 31–35 (2014)
6.
Zurück zum Zitat Qu, Z.Y., Li, Y.Y.: A network security situation evaluation method based on D-S evidence theory. In: International Conference on Environmental Science and Information Application Technology, pp. 496–499. IEEE (2010) Qu, Z.Y., Li, Y.Y.: A network security situation evaluation method based on D-S evidence theory. In: International Conference on Environmental Science and Information Application Technology, pp. 496–499. IEEE (2010)
7.
Zurück zum Zitat Liu, S.C., Liu, Y.: Network security risk assessment method based on HMM and attack graph model. In: IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/distributed Computing, pp. 517–522. IEEE (2016) Liu, S.C., Liu, Y.: Network security risk assessment method based on HMM and attack graph model. In: IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/distributed Computing, pp. 517–522. IEEE (2016)
8.
Zurück zum Zitat Hu, H., Zhang, H., Liu, Y., et al.: Quantitative method for network security situation based on attack prediction. Secur. Commun. Netw. 1–19 (2017) Hu, H., Zhang, H., Liu, Y., et al.: Quantitative method for network security situation based on attack prediction. Secur. Commun. Netw. 1–19 (2017)
9.
Zurück zum Zitat Dang, D.: Assessment of information security risk by support vector machine. J. Huazhong Univ. Sci. Technol. 38(3), 46–49 (2010) Dang, D.: Assessment of information security risk by support vector machine. J. Huazhong Univ. Sci. Technol. 38(3), 46–49 (2010)
10.
Zurück zum Zitat Liang, X., Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutor. 15(1), 472–486 (2013)CrossRef Liang, X., Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutor. 15(1), 472–486 (2013)CrossRef
11.
Zurück zum Zitat Chen, Y., Wu, X., et al.: Network security evaluation of stochastic game and network based on entropy. J. Beijing Univ. Posts Telecommun. 1, 92–96 (2014) Chen, Y., Wu, X., et al.: Network security evaluation of stochastic game and network based on entropy. J. Beijing Univ. Posts Telecommun. 1, 92–96 (2014)
12.
Zurück zum Zitat Wang, Y., et al.: Modeling and security analysis of enterprise network using attack–defense stochastic game Petri nets. Secur. Commun. Netw. 6(1), 89–99 (2013)CrossRef Wang, Y., et al.: Modeling and security analysis of enterprise network using attack–defense stochastic game Petri nets. Secur. Commun. Netw. 6(1), 89–99 (2013)CrossRef
13.
Zurück zum Zitat Shen, D., Chen, G., Haynes, L., et al.: A Markov game theoretic data fusion approach for cyber situational awareness. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 6571, no. 48, pp. 65710F–65710F-12 (2007) Shen, D., Chen, G., Haynes, L., et al.: A Markov game theoretic data fusion approach for cyber situational awareness. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 6571, no. 48, pp. 65710F–65710F-12 (2007)
15.
Zurück zum Zitat Shandilya, V., Shiva, S.: A Network Security Game Model, pp. 159–161 (2015) Shandilya, V., Shiva, S.: A Network Security Game Model, pp. 159–161 (2015)
16.
Zurück zum Zitat Liu, X., Yuan, Y.: A novel dynamic method in distributed network attack-defense game. Math. Probl. Eng. 1–7 (2015) Liu, X., Yuan, Y.: A novel dynamic method in distributed network attack-defense game. Math. Probl. Eng. 1–7 (2015)
17.
Zurück zum Zitat Zhang, Y., Tan, X., Cui, X.: Network security situation awareness approach based on Markov game model. J. Softw. 22, 495–508 (2011)CrossRef Zhang, Y., Tan, X., Cui, X.: Network security situation awareness approach based on Markov game model. J. Softw. 22, 495–508 (2011)CrossRef
18.
Zurück zum Zitat GB/T 20984-2007: Information security technology, information security risk assessment specification GB/T 20984-2007: Information security technology, information security risk assessment specification
19.
Zurück zum Zitat Feng, N., Wang, H.J., Li, M.: A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis. Inf. Sci. 256, 57–73 (2014)CrossRef Feng, N., Wang, H.J., Li, M.: A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis. Inf. Sci. 256, 57–73 (2014)CrossRef
20.
Zurück zum Zitat Zhang, Y., Fang, B.X., Chi, Y., Yun, X.: Research on network node correlation in network risk assessment. J. Comput. Res. 30, 234–240 (2007) Zhang, Y., Fang, B.X., Chi, Y., Yun, X.: Research on network node correlation in network risk assessment. J. Comput. Res. 30, 234–240 (2007)
Metadaten
Titel
Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model
verfasst von
Jianyi Liu
Fangyu Weng
Ru Zhang
Yunbiao Guo
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_15