Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3523181.3523192acmotherconferencesArticle/Chapter ViewAbstractPublication PagesasseConference Proceedingsconference-collections
research-article

The Research on Real-time Security Situation Assessment Technology Based on the Threat Propagation Model

Published: 18 April 2022 Publication History

Abstract

Network security situation assessment is a research hotspot in the field of information security, which is strong in real-time performance. However, most of the current real-time situation assessment technologies are very complicated and do poorly in real-time performance. Hence, this paper puts forward a real-time situation assessment method based on the threat propagation model. This method establishes a threat propagation model of real-time situation assessment, in order to calculate the threat degree of threat propagation source to target network, and to evaluate the real-time situation assessment from two layers which includes the network node layer and the whole network layer. The results of simulation experiment show that the method proposed in this paper can evaluate the potential threats according to the current attack scenarios, and can achieve a real-time assessment on the attacks in the network since the situation of real-time network attacks change obviously. In short, the effectiveness, accuracy and real-time performance of the proposed method are verified by comparative experiments.

References

[1]
Gong Jian, Zang Xiaodong, Su Qi, Survey of Network Security Situation Awareness [J]. Journal of Software, 2017, 28(4):1010-1026.
[2]
Leau Y B, Manickam S, Chong Y W. Network Security Situation Assessment: A Review and Discussion[M]// Information Science and Applications. Springer Berlin Heidelberg, 2015:407-414.
[3]
Zhang Yong, Tan Xiaobin, Cui Xiaolin, .Network Security Situation Awareness Approach Based on Markov Game Model [J].Journal of Software, 2011, 22( 3) : 495-508.
[4]
Ma Gang, Du Yuge, Rong Jiang, Risk assessment of complex information system security based on threat propagation [J]. Journal of Tsinghua University(Science and Technology), 2014(1):35-43.
[5]
Chen Feng, Liu Dehui, Zhang Yi, A Hierarchical Evaluation Approach for Network Security Based on Threat Spread Model[J]. JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT, 2011, 48(6):945-954.
[6]
Tian Jianwei, Tian Zheng, Qi Wenhui, Threat Propagation Based Security Situation Quantitative Assessment in Multi-Node Network [J]. JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT, 2017, 54(4):731-741.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ASSE' 22: 2022 3rd Asia Service Sciences and Software Engineering Conference
February 2022
202 pages
ISBN:9781450387453
DOI:10.1145/3523181
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 April 2022

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ASSE' 22

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 33
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media