Research on a Method of Service-Oriented Network Layer Network Security Situation Assessment

Article Preview

Abstract:

The purpose of this study is to obtain the running situation of the network service accurately and efficiently, and then to perceive the overall security situation of the network. Simultaneity, find the potential agressire behavior and abnormal status. A service-oriented approach is presented. After establishing an evaluation index system at the network level, extracting the momentum factors, we use fuzzy AHP combining with evidence theory for real-time evaluation of network security situation to get the running situation of the network service, and then to evaluate the overall security situation of the network, identify potential attacks and network anomalies, help network policy makers take positive action and avoid to cause irreparable serious consequences. Experimental data show that the network security posture assessment results can be sensitive to changes in network status and accurately reflect the status of the network's security situation.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

260-264

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] K. Lakkraju, W. Yurcik, and A. J. Lee, Nvisionip, Netflow visualizations of system state for security situational assessment, in Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security (2004).

DOI: 10.1145/1029208.1029219

Google Scholar

[2] S. Webster, R. Lippmann, and M. Zissman, Experience using active and passive mapping for network situational assessment, in Network Computing and Applications, 2006. NCA 2006. Fifth IEEE International Symposium on. 2006. 19-26.

DOI: 10.1109/nca.2006.23

Google Scholar

[3] C. Onwubiko and T. Owens, Review of situational assessment for computer network defense, Situational Assessment in Computer Network Defense: Principles, Methods and Applications (2012), 1-7.

DOI: 10.4018/978-1-4666-0104-8.ch001

Google Scholar