Network security situation evaluation method for multi-step attack
Aiming at analyzing the influence of multi-step attack,as well as reflecting the system’s security situation accurately and comprehensively,a network security situation evaluation method for multi-step attack was proposed.This method firstly clustered security events into several attack scenes,which...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2017-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017021/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539546988150784 |
---|---|
author | Hao-pu YANG Hui QIU Kun WANG |
author_facet | Hao-pu YANG Hui QIU Kun WANG |
author_sort | Hao-pu YANG |
collection | DOAJ |
description | Aiming at analyzing the influence of multi-step attack,as well as reflecting the system’s security situation accurately and comprehensively,a network security situation evaluation method for multi-step attack was proposed.This method firstly clustered security events into several attack scenes,which was used to identify the attacker.Then the attack path and the attack phase were identified by causal correlation of every scene.Finally,combined with the attack phase as well as the threat index,the quantitative standard was established to evaluate the network security situation.The proposed method is assessed by two network attack-defense experiments,and the results illustrate accuracy and effectiveness of the method. |
format | Article |
id | doaj-art-f7e868c4765d49cc9519e645787e8c58 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2017-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-f7e868c4765d49cc9519e645787e8c582025-01-14T07:11:33ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-01-013818719859706980Network security situation evaluation method for multi-step attackHao-pu YANGHui QIUKun WANGAiming at analyzing the influence of multi-step attack,as well as reflecting the system’s security situation accurately and comprehensively,a network security situation evaluation method for multi-step attack was proposed.This method firstly clustered security events into several attack scenes,which was used to identify the attacker.Then the attack path and the attack phase were identified by causal correlation of every scene.Finally,combined with the attack phase as well as the threat index,the quantitative standard was established to evaluate the network security situation.The proposed method is assessed by two network attack-defense experiments,and the results illustrate accuracy and effectiveness of the method.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017021/scene clusteringmulti-step attacksecurity situationquantification analysis |
spellingShingle | Hao-pu YANG Hui QIU Kun WANG Network security situation evaluation method for multi-step attack Tongxin xuebao scene clustering multi-step attack security situation quantification analysis |
title | Network security situation evaluation method for multi-step attack |
title_full | Network security situation evaluation method for multi-step attack |
title_fullStr | Network security situation evaluation method for multi-step attack |
title_full_unstemmed | Network security situation evaluation method for multi-step attack |
title_short | Network security situation evaluation method for multi-step attack |
title_sort | network security situation evaluation method for multi step attack |
topic | scene clustering multi-step attack security situation quantification analysis |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017021/ |
work_keys_str_mv | AT haopuyang networksecuritysituationevaluationmethodformultistepattack AT huiqiu networksecuritysituationevaluationmethodformultistepattack AT kunwang networksecuritysituationevaluationmethodformultistepattack |