网络安全风险评估和情况分析

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Network Security Risk Assessment and Situation Analysis

Liu Mixi Dˆ Yu Dongmei Zhang Qiuyu Zhu Honglei

College of Computer and Communication, Lanzhou University of Technology, Lanzhou, China 730050

Email: liumx@

ABSTRACT˖With the development of computer networks, the spread of malicious network activities poses great risks to the operational integrity of many organizations and imposes heavy economic burdens on life and health. Therefore, risk assessment is very important in network security management and analysis. Network security situation analysis not only can describe the current state but also project the next behavior of the network. Alerts coming from IDS, Firewall, and other security tools are currently growing at a rapid pace. Large organizations are having trouble keeping on top of the current state of their networks. In this paper, we described cyberspace situational awareness from formal and visual methods. Next, to make security administrator comprehend security situation and project the next behaviors of the whole network, we present using parallel axes view to give expression clearly of security events correlations. At last, we concluded that visualization is an important research of risk evaluation and situation analysis of network.

KEYWORDS˖security assessment, situational awareness, visualization, correlation

1 INTRODUCTION

Network security estimation is to detect computer system or network facilities to find security holes and vulnerability possibly imposed by hacker, take measures earlier, and protect network system from threats. The current methods of risk evaluation on information security are basically related to qualitative and quantitative ones. Researches on network security situation have two great classes of based on system deployment and running information according to data resources[1]. The former is about system design, deployment, service and hidden trouble in the system. The latter is about attacks situations on the system mainly from IDS logs database.

Security situation estimation work based on system running information is mainly about threat estimation from single event on the system. Bass presented that next generation cyberspace intrusion detection systems will fuse data from heterogeneous distributed network sensors to create cyberspace situational awareness, and multisensor data fusion technology is an important avenue on the road toward the development of highly reliable intrusion detection and security-decision systems that identify, track, and assess cyberspace situations with multiple complex threats[2][3]. But he only offers small steps in the process of setting the engineering requirements to design and develop cyberspace situational awareness systems. Chen Xiuzhen developed a quantitative hierarchical threat evaluation model and computational method based on the structure of the network and the importance of services and hosts to evaluate security threat status of a computer network system[1].

Because attacks are dynamic, if analysts can’t absorb and correlate the available data, it is difficult for them to detect sophisticated attacks. Developing tools that increase the situational awareness and understanding of all those responsible for the network’s safe operation can increase a computer network’s overall security. System administrators are typically limited to textual or simple graphical representations of network activity. There is a growing body of research that validates the role of visualization as a means for solving complex data problems. Y arden and Stefano focus on visual correlation of network alerts and situational awareness[4][5]. The National Center for S upercomputing Applications (NCS A) has developed two applications for the detection of network incidents: VisFlowConnect[6] and

相关文档
最新文档