Skip to main content

2024 | OriginalPaper | Buchkapitel

Research on Network Security Situation Assessment Method

verfasst von : Yuan Gao, Jin Wen, Pu Chen, Zhiqiang Wang

Erschienen in: Proceedings of the 13th International Conference on Computer Engineering and Networks

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet has penetrated into various fields of human production and life. While enjoying Internet technology, people have to face various problems brought about by the Internet, among which network security issues are particularly prominent. The network security situation assessment summarizes, filters and analyzes security events generated by devices, builds suitable mathematical models based on security indicators and assesses the level of security threats to the entire network system, thereby analyzing and capturing the overall security status of the network. This paper analyzes the relevant research at home and abroad, and selects Elman neural network model, intuitionistic fuzzy set model and hidden Markov model for network security situation assessment. The result is compared with the expert assessment, and the advantages and disadvantages of the different models are analyzed in conjunction with relevant model theory. It is found that the network security situation assessment model more suitable for the current network environment is the intuitionistic fuzzy set model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, J., Xu, Y.: Internet usage, human capital and CO2 emissions: a global perspective. Sustainability 13(15), 8268 (2021)CrossRef Wang, J., Xu, Y.: Internet usage, human capital and CO2 emissions: a global perspective. Sustainability 13(15), 8268 (2021)CrossRef
2.
Zurück zum Zitat Ørmen, J., Helles, R., Jensen, K.B.: The social uses of the Internet: Introduction to the special section. New Media Soc. 23(7), 1739–1750 (2021)CrossRef Ørmen, J., Helles, R., Jensen, K.B.: The social uses of the Internet: Introduction to the special section. New Media Soc. 23(7), 1739–1750 (2021)CrossRef
3.
Zurück zum Zitat Wu, H., Ba, N., Ren, S., Xu, L., Chai, J., Irfan, M., et al.: The impact of internet development on the health of Chinese residents: transmission mechanisms and empirical tests. Socioecon. Plann. Sci. 81, 101178 (2022)CrossRef Wu, H., Ba, N., Ren, S., Xu, L., Chai, J., Irfan, M., et al.: The impact of internet development on the health of Chinese residents: transmission mechanisms and empirical tests. Socioecon. Plann. Sci. 81, 101178 (2022)CrossRef
5.
Zurück zum Zitat Saba, T., Rehman, A., Sadad, T., Kolivand, H., Bahaj, S.A.: Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput. Electr. Eng. 99, 107810 (2022)CrossRef Saba, T., Rehman, A., Sadad, T., Kolivand, H., Bahaj, S.A.: Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput. Electr. Eng. 99, 107810 (2022)CrossRef
6.
Zurück zum Zitat Zhang, K., Zheng, W., Yu, X., Wang, H., Wang, Z.: Research on recognition of network security situation elements based on PSO-TSA model. J. Hunan Univ. (Nat. Sci.) 49(04), 119–127 (2022) Zhang, K., Zheng, W., Yu, X., Wang, H., Wang, Z.: Research on recognition of network security situation elements based on PSO-TSA model. J. Hunan Univ. (Nat. Sci.) 49(04), 119–127 (2022)
7.
Zurück zum Zitat Guembe, B., Azeta, A., Misra, S., Osamor, V.C., Fernandez-Sanz, L., Pospelova, V.: The emerging threat of ai-driven cyber attacks: a review. Appl. Artif. Intell. 36(1), 2037254 (2022)CrossRef Guembe, B., Azeta, A., Misra, S., Osamor, V.C., Fernandez-Sanz, L., Pospelova, V.: The emerging threat of ai-driven cyber attacks: a review. Appl. Artif. Intell. 36(1), 2037254 (2022)CrossRef
8.
Zurück zum Zitat Kim, K., Alfouzan, F.A., Kim, H.: Cyber-attack scoring model based on the offensive cybersecurity framework. Appl. Sci. 11(16), 7738 (2021)CrossRef Kim, K., Alfouzan, F.A., Kim, H.: Cyber-attack scoring model based on the offensive cybersecurity framework. Appl. Sci. 11(16), 7738 (2021)CrossRef
9.
Zurück zum Zitat Lallie, H.S., et al.: Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)CrossRef Lallie, H.S., et al.: Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)CrossRef
10.
Zurück zum Zitat Akpan, F., Bendiab, G., Shiaeles, S., Karamperidis, S., Michaloliakos, M.: Cybersecurity challenges in the maritime sector. Network 2(1), 123–138 (2022)CrossRef Akpan, F., Bendiab, G., Shiaeles, S., Karamperidis, S., Michaloliakos, M.: Cybersecurity challenges in the maritime sector. Network 2(1), 123–138 (2022)CrossRef
11.
Zurück zum Zitat Tufail, S., Parvez, I., Batool, S., Sarwat, A.: A survey on cybersecurity challenges, detection, and mitigation techniques for the smart grid. Energies 14(18), 5894 (2021)CrossRef Tufail, S., Parvez, I., Batool, S., Sarwat, A.: A survey on cybersecurity challenges, detection, and mitigation techniques for the smart grid. Energies 14(18), 5894 (2021)CrossRef
12.
Zurück zum Zitat Mijwil, M., Doshi, R., Hiran, K.K., Al-Mistarehi, A.H., Gök, M.: Cybersecurity challenges in smart cities: an overview and future prospects. Mesop. J. Cybersecur. 2022, 1–4 (2022) Mijwil, M., Doshi, R., Hiran, K.K., Al-Mistarehi, A.H., Gök, M.: Cybersecurity challenges in smart cities: an overview and future prospects. Mesop. J. Cybersecur. 2022, 1–4 (2022)
13.
Zurück zum Zitat Hussain, A., Mohamed, A., Razali, S.: A review on cybersecurity: challenges & emerging threats. In: Proceedings of the 3rd International Conference on Networking, Information Systems & Security, pp. 1–7. Association for Computing Machinery, New York, USA (2020) Hussain, A., Mohamed, A., Razali, S.: A review on cybersecurity: challenges & emerging threats. In: Proceedings of the 3rd International Conference on Networking, Information Systems & Security, pp. 1–7. Association for Computing Machinery, New York, USA (2020)
14.
Zurück zum Zitat Bass, T.: Intrusion detection systems and multisensory data fusion: creating cyberspace situational awareness. Commun. ACM 43(4), 99–105 (2000)CrossRef Bass, T.: Intrusion detection systems and multisensory data fusion: creating cyberspace situational awareness. Commun. ACM 43(4), 99–105 (2000)CrossRef
15.
Zurück zum Zitat Blyth, A.: Footprinting for intrusion detection and threat assessment. Inf. Secur. Tech. Rep. 4(3), 43–53 (1999)CrossRef Blyth, A.: Footprinting for intrusion detection and threat assessment. Inf. Secur. Tech. Rep. 4(3), 43–53 (1999)CrossRef
16.
Zurück zum Zitat De Montigny-Leboeuf, A., Massicotte, F.: Passive network discovery for real time situation awareness. In: Proceedings of the The RTO Information Systems Technology Panel (IST) Symposium on Adaptive Defence in Unclassified Networks, pp. 288–300 (2004) De Montigny-Leboeuf, A., Massicotte, F.: Passive network discovery for real time situation awareness. In: Proceedings of the The RTO Information Systems Technology Panel (IST) Symposium on Adaptive Defence in Unclassified Networks, pp. 288–300 (2004)
17.
Zurück zum Zitat Yurcik, W., Barlow, J., Lakkaraju, K., Haberman, M.: Two visual computer network security monitoring tools incorporating operator interface requirements. In: ACM CHI Workshop on Human-Computer Interaction and Security Systems (HCISEC) (2003) Yurcik, W., Barlow, J., Lakkaraju, K., Haberman, M.: Two visual computer network security monitoring tools incorporating operator interface requirements. In: ACM CHI Workshop on Human-Computer Interaction and Security Systems (HCISEC) (2003)
18.
Zurück zum Zitat Cisco: NetFlow Services and Applications. White Paper (1999) Cisco: NetFlow Services and Applications. White Paper (1999)
19.
Zurück zum Zitat Liao, Y., Zhao, G., Wang, J., Li, S.: Network security situation assessment model based on extended hidden Markov. Mathematical Problems in Engineering 2020 (2020) Liao, Y., Zhao, G., Wang, J., Li, S.: Network security situation assessment model based on extended hidden Markov. Mathematical Problems in Engineering 2020 (2020)
20.
Zurück zum Zitat Chen, X., Zheng, Q., Guan, X., Lin, C.: Quantitative hierarchical threat evaluation model for network security. J. Softw. 04, 885–897 (2006)CrossRef Chen, X., Zheng, Q., Guan, X., Lin, C.: Quantitative hierarchical threat evaluation model for network security. J. Softw. 04, 885–897 (2006)CrossRef
21.
Zurück zum Zitat Gu, Z., Wang, R.: A security situation assessment model of information system based on improved fuzzyanalytical hierarchy process. Comput. Eng. Sci. 38(10), 2010–2017 (2016) Gu, Z., Wang, R.: A security situation assessment model of information system based on improved fuzzyanalytical hierarchy process. Comput. Eng. Sci. 38(10), 2010–2017 (2016)
22.
Zurück zum Zitat Shi, L., Xu, X., Liu, Y., Liu, J.: An lmproved probabilistic neural network method of security situation assessment for industrial control system. Netinfo Secur. 21(03), 15–25 (2021) Shi, L., Xu, X., Liu, Y., Liu, J.: An lmproved probabilistic neural network method of security situation assessment for industrial control system. Netinfo Secur. 21(03), 15–25 (2021)
23.
Zurück zum Zitat Elman, J.L.: Distributed representations, simple recurrent networks, and grammatical structure. Mach. Learn. 7, 195–225 (1991)CrossRef Elman, J.L.: Distributed representations, simple recurrent networks, and grammatical structure. Mach. Learn. 7, 195–225 (1991)CrossRef
Metadaten
Titel
Research on Network Security Situation Assessment Method
verfasst von
Yuan Gao
Jin Wen
Pu Chen
Zhiqiang Wang
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-9247-8_14