Abstract
In the network security situation assessment based on hidden Markov model, the establish of state transition matrix is the key to the accuracy of the impact assessment. The state transition matrix is often given based on experience. However, it often ignores the current status of the network. In this paper,based on the game process between the security incidents and protect measures,we improve the efficiency of the state transition matrix by considering the defense efficiency. Comparative experiments show the probability of the network state generated by improved algorithm is more reasonable in network security situation assessment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bass, T.: Multisensor data fusion for next generation distributed intrusion detection systems (1999)
Bass, T.: Intrusion detection systems and multisensor data fusion. Commun. ACM 43(4), 99–105 (2000)
Xz, C., et al.: Quantitative hierarchical threat evaluation model for network security. J. Softw. 17(4), 885–897 (2006)
Xiuzhen, X., et al.: Study on evaluation for security situation of networked system. J. Xi’An Jiaotong Univ. 38(4), 404–408 (2004)
Ning, P., et al.: Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. (TISSEC) 7(2), 274–318 (2004)
Xu, D., Ning, P.: Alert correlation through triggering events and common resources. In: 20th Annual Computer Security Applications Conference. IEEE (2004)
Yong, Z., et al.: Network security situation awareness approach based on Markov game model. J. Softw. 22(3), 009 (2011)
Årnes, A., Valeur, F., Vigna, G., Kemmerer, R.A.: Using Hidden Markov Models to evaluate the risks of intrusions. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 145–164. Springer, Heidelberg (2006)
Årnes, A., Sallhammar, K., Haslum, K., Brekne, T., Moe, M.E.G., Knapskog, S.J.: Real-time risk assessment with network sensors and intrusion detection systems. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 388–397. Springer, Heidelberg (2005)
Khosravi-Farmad M, Rezaee R, Harati A, et al.: Network security risk mitigation using Bayesian decision networks. In: 2014 4th International eConference on Computer and Knowledge Engineering (ICCKE), pp. 267–272. IEEE (2014)
Rongrong, X., et al.: An improved quantitative evaluation method for network security. Chinese J. Comput. 38(4), 749–758 (2015)
Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77(2), 257–286 (1989)
Han, R., Zhao, B., Xu, K.: Policy-based integrative network security management system. Comput. Eng. 8, 069 (2009)
Jianfeng, Z.: Graduate School of National University of Defense Technology (2013)
Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)
Lincoln Laboratory (2000). https://www.ll.mit.edu/ideval/data/2000data.html
Acknowledgements
This research is funded by the National Natural Science Foundation of China (No. 61170295), the Project of National Ministries Foundation of China (A2120110006), the CoFunding Project of Beijing Municipal Education Commission (JD100060630) and the Research Project of Aviation Industry of China (CXY2011BH07).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Xiang, S., Lv, Y., Xia, C., Li, Y., Wang, Z. (2016). A Method of Network Security Situation Assessment Based on Hidden Markov Model. In: Li, K., Li, J., Liu, Y., Castiglione, A. (eds) Computational Intelligence and Intelligent Systems. ISICA 2015. Communications in Computer and Information Science, vol 575. Springer, Singapore. https://doi.org/10.1007/978-981-10-0356-1_65
Download citation
DOI: https://doi.org/10.1007/978-981-10-0356-1_65
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0355-4
Online ISBN: 978-981-10-0356-1
eBook Packages: Computer ScienceComputer Science (R0)