Skip to main content
Erschienen in: Wireless Personal Communications 2/2018

03.01.2018

Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process

verfasst von: Huan Wang, Zhanfang Chen, Xin Feng, Xiaoqiang Di, Dan Liu, Jianping Zhao, Xin Sui

Erschienen in: Wireless Personal Communications | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In hierarchical network security situation assessment model, there are many problems, such as subjective index weight factor, large evaluation index system, large amount of calculation and low efficiency. A network security situation assessment model and quantification method based on AHP is proposed to solve this problem. The AHP analytic hierarchy process (AHP) is combined with the hierarchical model of situation assessment to simplify the situation assessment problem. The D–S evidence theory is used to fuse the fuzzy results of multi-source equipment to solve the problem of single information source and large deviation of accuracy. Through the construction of three evaluation indexes of risk situation, basic operation situation and damage situation, the problem of large evaluation index system and low evaluation efficiency is solved. AHP analytic hierarchy process is used to determine the weights of different index items, so as to avoid the subjectivity and randomness of weighting factors. The simulation results show that the model can reflect the security status of the network as a whole, and the situation assessment is accurate and can better serve the high-level decision-making.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hu, G. Y., & Qiao, P. L. (2015). An efficient improvement of CMA-ES algorithm for the network security situation prediction. The Open Automation and Control Systems Journal, 7(1), 1499–1517.CrossRef Hu, G. Y., & Qiao, P. L. (2015). An efficient improvement of CMA-ES algorithm for the network security situation prediction. The Open Automation and Control Systems Journal, 7(1), 1499–1517.CrossRef
2.
Zurück zum Zitat Wang, Y. Z., Li, J. Y., Meng, K., et al. (2013). Modeling and security analysis of enterprise network using attack–defense stochastic game Petri nets. Security and Communication Networks, 6(I), 89–99.CrossRef Wang, Y. Z., Li, J. Y., Meng, K., et al. (2013). Modeling and security analysis of enterprise network using attack–defense stochastic game Petri nets. Security and Communication Networks, 6(I), 89–99.CrossRef
3.
Zurück zum Zitat Liu, X. W., Wang, H. Q., Lu, H. W., Yu, J. G., & Zhang, S. W. (2016). Fusion-based cognitive awareness-control model for network security situation. Journal of Software, 27(8), 2099–2114.MathSciNet Liu, X. W., Wang, H. Q., Lu, H. W., Yu, J. G., & Zhang, S. W. (2016). Fusion-based cognitive awareness-control model for network security situation. Journal of Software, 27(8), 2099–2114.MathSciNet
4.
Zurück zum Zitat Wang, H., Gu, J., Su, W., Zhao, Z. P. (2016). An evaluation method of multi-source information fusion based on network security situation. In The 7th international symposium on computational intelligence and industrial applications (pp. 1–7). ISCIIA2016. Wang, H., Gu, J., Su, W., Zhao, Z. P. (2016). An evaluation method of multi-source information fusion based on network security situation. In The 7th international symposium on computational intelligence and industrial applications (pp. 1–7). ISCIIA2016.
5.
Zurück zum Zitat Xie, L. X., Wang, Y. C., & Yu, J. B. (2013). Network security situation awareness based on neural networks. Journal Tsinghua University: Science & Technology, 23(12), 1750–1760. Xie, L. X., Wang, Y. C., & Yu, J. B. (2013). Network security situation awareness based on neural networks. Journal Tsinghua University: Science & Technology, 23(12), 1750–1760.
6.
Zurück zum Zitat Kotenko, I, Doynikova, E. (2014). Security evaluation for cyber situational awareness. In Proceedings of the high performance computing and communications (pp. 1197–1204). Kotenko, I, Doynikova, E. (2014). Security evaluation for cyber situational awareness. In Proceedings of the high performance computing and communications (pp. 1197–1204).
7.
Zurück zum Zitat Ramasso, E., & Denoeux, T. (2014). Making use of partial knowledge about hidden States in HMMS: An approach based on belief functions. IEEE Transactions On Fuzzy System, 22(2), 395–405.CrossRef Ramasso, E., & Denoeux, T. (2014). Making use of partial knowledge about hidden States in HMMS: An approach based on belief functions. IEEE Transactions On Fuzzy System, 22(2), 395–405.CrossRef
8.
Zurück zum Zitat Luo, Y. X., Zhao, M. H., Zhang, Q. Y., & Zou, A. J. (2011). Network security situation awareness model-inspired by immune. Advanced Materials Research, 267, 635–638.CrossRef Luo, Y. X., Zhao, M. H., Zhang, Q. Y., & Zou, A. J. (2011). Network security situation awareness model-inspired by immune. Advanced Materials Research, 267, 635–638.CrossRef
9.
Zurück zum Zitat Anthony, C., Chao, Y., Sirisak, K., et al. (2007). Network-based accessibility measures for vulnerability analysis of degradable transportation networks. Networks and spatial economics, 3, 241–256.MATH Anthony, C., Chao, Y., Sirisak, K., et al. (2007). Network-based accessibility measures for vulnerability analysis of degradable transportation networks. Networks and spatial economics, 3, 241–256.MATH
10.
Zurück zum Zitat Tony, H. G., Timothy, C. M., Alan, T. M., et al. (2008). Comparative approaches for assessing network vulnerability. International regional science review, 1, 88–112. Tony, H. G., Timothy, C. M., Alan, T. M., et al. (2008). Comparative approaches for assessing network vulnerability. International regional science review, 1, 88–112.
11.
Zurück zum Zitat Erik, J., & Lars, G. M. (2012). Road network vulnerability analysis of area-covering disruptions: A grid-based approach with case study. Transportation research, part A. Policy and Practice, 5, 746–760. Erik, J., & Lars, G. M. (2012). Road network vulnerability analysis of area-covering disruptions: A grid-based approach with case study. Transportation research, part A. Policy and Practice, 5, 746–760.
12.
Zurück zum Zitat Wang, X. Z. (2016). Network information security situation assessment based on bayesian network. International Journal of Security and its Applications, 5, 129–138.CrossRef Wang, X. Z. (2016). Network information security situation assessment based on bayesian network. International Journal of Security and its Applications, 5, 129–138.CrossRef
13.
Zurück zum Zitat Wang, Y. (2016). Research on network security situation prediction based on markov game theory. International Journal of Security and its Applications, 9, 301–308. Wang, Y. (2016). Research on network security situation prediction based on markov game theory. International Journal of Security and its Applications, 9, 301–308.
15.
Zurück zum Zitat Liu, N., Li, G., Liu, Y. (2011). A method of network security situation prediction based on gray neural network model. In International conference on mechanical engineering, industry and manufacturing engineering (MEIME2011) (pp. 928–931). Trans Tech Publications. Liu, N., Li, G., Liu, Y. (2011). A method of network security situation prediction based on gray neural network model. In International conference on mechanical engineering, industry and manufacturing engineering (MEIME2011) (pp. 928–931). Trans Tech Publications.
16.
Zurück zum Zitat Xiao, J. Q. (2012). Prediction of networks security situation based on wavelet kernel function network. In China Japan international conference on numbers, intelligence, manufacturing technology and machinery automation (MAMT 2011) (pp. 51–56). Trans Tech Publications. Xiao, J. Q. (2012). Prediction of networks security situation based on wavelet kernel function network. In China Japan international conference on numbers, intelligence, manufacturing technology and machinery automation (MAMT 2011) (pp. 51–56). Trans Tech Publications.
17.
Zurück zum Zitat Mo, X. J. (2014). Study on information security of network-based manufacturing environment. In International conference on green power, materials and manufacturing technology and applications (pp. 483–486). Trans Tech Publications. Mo, X. J. (2014). Study on information security of network-based manufacturing environment. In International conference on green power, materials and manufacturing technology and applications (pp. 483–486). Trans Tech Publications.
18.
Zurück zum Zitat Lu, S.S., Wang, X. F., Mao, L.,(2014). Network security situation awareness based on network simulation. In IEEE workshop on electronics, computer and applications (pp. 512–517). Institute of Electrical and Electronics Engineers. Lu, S.S., Wang, X. F., Mao, L.,(2014). Network security situation awareness based on network simulation. In IEEE workshop on electronics, computer and applications (pp. 512–517). Institute of Electrical and Electronics Engineers.
19.
Zurück zum Zitat Wang, Y. Z., Yu, M., Li, J. Y., et al. (2012). Stochastic game net and applications in security analysis for enterprise network. International Journal of Information Security, 11(1), 41–52.CrossRef Wang, Y. Z., Yu, M., Li, J. Y., et al. (2012). Stochastic game net and applications in security analysis for enterprise network. International Journal of Information Security, 11(1), 41–52.CrossRef
20.
Zurück zum Zitat Yan, G. H., Lee, R., Kent, A., et al.(2012). Towards a Bayesian network game framework for evaluating DDoS attacks and defense. In CCS’12 Proceedings of the 2012 ACM conference on computer and communications security (pp. 553–566). USA:ACM. Yan, G. H., Lee, R., Kent, A., et al.(2012). Towards a Bayesian network game framework for evaluating DDoS attacks and defense. In CCS’12 Proceedings of the 2012 ACM conference on computer and communications security (pp. 553–566). USA:ACM.
21.
Zurück zum Zitat Liu, G., Li, Q. M., & Zhang, H. (2013). Defense strategy generation method for network security based on state attack-defense graph. Journal of Computer Applications, 33(S1), 121–125. Liu, G., Li, Q. M., & Zhang, H. (2013). Defense strategy generation method for network security based on state attack-defense graph. Journal of Computer Applications, 33(S1), 121–125.
Metadaten
Titel
Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process
verfasst von
Huan Wang
Zhanfang Chen
Xin Feng
Xiaoqiang Di
Dan Liu
Jianping Zhao
Xin Sui
Publikationsdatum
03.01.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-5202-3

Weitere Artikel der Ausgabe 2/2018

Wireless Personal Communications 2/2018 Zur Ausgabe

Neuer Inhalt