Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2826112.2826135guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article
Free access

Network security risk assessment based on item response theory

Published: 25 May 2015 Publication History

Abstract

Owing to the traditional risk assessment method has one-sidedness and is difficult to reflect the real network situation, a risk assessment method based on Item Response Theory (IRT) is put forward in network security. First of all, the novel algorithms of calculating the threat of attack and the successful probability of attack are proposed by the combination of IRT model and Service Security Level. Secondly, the service weight of importance is calculated by the three-demarcation analytic hierarchy process. Finally, the risk situation graph of service, host and network logic layer could be generated by the improved method. The simulation results show that this method can be more comprehensive consideration of factors which are affecting network security, and a more realistic network risk situation graph in real-time will be obtained.

References

[1]
M. Abedin, S. Nessa, and E. Al-Shaer. Vulnerability analysis for evaluating quality of protection of security policies. In Proceedings of the 2nd ACM workshop on Quality of protection, pages 49--52, 2006.
[2]
A. Ali, P. Zavarsky, D. Lindskog, and R. Ruhl. A software application to analyze the effects of temporal and environmental metrics on overall cvss v2 score. In Internet Security (WorldCIS), 2011 World Congress on, pages 109--113, 2011.
[3]
F. Arnold, W. Pieters, and M. Stoelinga. Quantitative penetration testing with item response theory. In Information Assurance and Security (IAS), 2013 9th International Conference on, pages 49--54, 2013.
[4]
S. Baldiris, R. Fabregat, and S. Graf. Learning object recommendations based on quality and item response theory. In Advanced Learning Technologies (ICALT), 2014 IEEE 14th International Conference on, pages 34--36, 2014.
[5]
X. Z. Chen, Q. H. Zheng, and X. H. Guan. Quantitative hierarchical threat evaluation model for network security. Journal of Software, 17(4):885--897, 2006.
[6]
S. Fu and H. J. Zhou. The information security risk assessment based on ahp and fuzzy comprehensive evaluation. In Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, pages 124--128, 2011.
[7]
Z. H. Gong and Y. Zhou. Research on cyberspace situational awareness. Journal of Software, 21(7):1605--1619, 2010.
[8]
M. Keramati, A. Akbari, and M. Keramati. Cvss-based security metrics for quantitative analysis of attack graphs. In Computer and Knowledge Engineering (ICCKE), 2013 3th International eConference on, pages 178--183, 2013.
[9]
G. Liu, Q. M. Li, and H. Zhang. Reliability vector orthogonal projection decomposition method of network security risk assessment. Journal of Electronics and Information Technology, 34(8):1934--1938, 2012.
[10]
H. Tsai and Y. L. Huang. An analytic hierarchy process-based risk assessment method for wireless networks. Reliability, IEEE Transactions on, 60(4):801--816, 2011.
[11]
H. Wang, J. Chen, and C. Q. Ma. Research on the improvement of irt item parameter estimation algorithm. In Computational Intelligence and Design (ISCID), 2012 Fifth International Symposium on, volume 1, pages 160--163, 2012.
[12]
X. H. Wang and L. P. Zou. A decision model for agile software release. In Reliability, Maintainability and Safety (ICRMS), 2011 9th International Conference on, pages 766--770, 2011.
[13]
Y. Wei, Y. F. Lian, and D. G. Feng. A network security situational awareness model based on information fusion. Journal of Computer Research and Development, 46(3):353--362, 2009.

Index Terms

  1. Network security risk assessment based on item response theory

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      MobiMedia '15: Proceedings of the 8th International Conference on Mobile Multimedia Communications
      May 2015
      249 pages
      ISBN:9781631900662
      • General Chair:
      • Honggang Wang

      Publisher

      ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

      Brussels, Belgium

      Publication History

      Published: 25 May 2015

      Author Tags

      1. IRT
      2. hierarchical model
      3. network security
      4. risk assessment

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 32
        Total Downloads
      • Downloads (Last 12 months)17
      • Downloads (Last 6 weeks)7
      Reflects downloads up to 15 Oct 2024

      Other Metrics

      Citations

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media