Skip to main content

A Method of Network Security Situation Assessment Based on Hidden Markov Model

  • Conference paper
  • First Online:
Computational Intelligence and Intelligent Systems (ISICA 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 575))

Abstract

In the network security situation assessment based on hidden Markov model, the establish of state transition matrix is the key to the accuracy of the impact assessment. The state transition matrix is often given based on experience. However, it often ignores the current status of the network. In this paper,based on the game process between the security incidents and protect measures,we improve the efficiency of the state transition matrix by considering the defense efficiency. Comparative experiments show the probability of the network state generated by improved algorithm is more reasonable in network security situation assessment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bass, T.: Multisensor data fusion for next generation distributed intrusion detection systems (1999)

    Google Scholar 

  2. Bass, T.: Intrusion detection systems and multisensor data fusion. Commun. ACM 43(4), 99–105 (2000)

    Article  Google Scholar 

  3. Xz, C., et al.: Quantitative hierarchical threat evaluation model for network security. J. Softw. 17(4), 885–897 (2006)

    Article  Google Scholar 

  4. Xiuzhen, X., et al.: Study on evaluation for security situation of networked system. J. Xi’An Jiaotong Univ. 38(4), 404–408 (2004)

    Google Scholar 

  5. Ning, P., et al.: Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. (TISSEC) 7(2), 274–318 (2004)

    Article  MathSciNet  Google Scholar 

  6. Xu, D., Ning, P.: Alert correlation through triggering events and common resources. In: 20th Annual Computer Security Applications Conference. IEEE (2004)

    Google Scholar 

  7. Yong, Z., et al.: Network security situation awareness approach based on Markov game model. J. Softw. 22(3), 009 (2011)

    Google Scholar 

  8. Årnes, A., Valeur, F., Vigna, G., Kemmerer, R.A.: Using Hidden Markov Models to evaluate the risks of intrusions. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 145–164. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Årnes, A., Sallhammar, K., Haslum, K., Brekne, T., Moe, M.E.G., Knapskog, S.J.: Real-time risk assessment with network sensors and intrusion detection systems. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 388–397. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Khosravi-Farmad M, Rezaee R, Harati A, et al.: Network security risk mitigation using Bayesian decision networks. In: 2014 4th International eConference on Computer and Knowledge Engineering (ICCKE), pp. 267–272. IEEE (2014)

    Google Scholar 

  11. Rongrong, X., et al.: An improved quantitative evaluation method for network security. Chinese J. Comput. 38(4), 749–758 (2015)

    MathSciNet  Google Scholar 

  12. Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77(2), 257–286 (1989)

    Article  Google Scholar 

  13. Han, R., Zhao, B., Xu, K.: Policy-based integrative network security management system. Comput. Eng. 8, 069 (2009)

    Google Scholar 

  14. Jianfeng, Z.: Graduate School of National University of Defense Technology (2013)

    Google Scholar 

  15. Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)

    MATH  Google Scholar 

  16. Lincoln Laboratory (2000). https://www.ll.mit.edu/ideval/data/2000data.html

Download references

Acknowledgements

This research is funded by the National Natural Science Foundation of China (No. 61170295), the Project of National Ministries Foundation of China (A2120110006), the CoFunding Project of Beijing Municipal Education Commission (JD100060630) and the Research Project of Aviation Industry of China (CXY2011BH07).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shuang Xiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Xiang, S., Lv, Y., Xia, C., Li, Y., Wang, Z. (2016). A Method of Network Security Situation Assessment Based on Hidden Markov Model. In: Li, K., Li, J., Liu, Y., Castiglione, A. (eds) Computational Intelligence and Intelligent Systems. ISICA 2015. Communications in Computer and Information Science, vol 575. Springer, Singapore. https://doi.org/10.1007/978-981-10-0356-1_65

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0356-1_65

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0355-4

  • Online ISBN: 978-981-10-0356-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics