Cart (Loading....) | Create Account
Close category search window
 
Skip to Results

Search Results

You searched for: network security
54,230 Results returned
Skip to Results
  • Save this Search
  • Download Citations Disabled
  • Save To Project
  • Email
  • Print
  • Export Results
  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A framework for network security situation awareness based on knowledge discovery

    Fang Lan ; Wang Chunlei ; Ma Guoqing
    Computer Engineering and Technology (ICCET), 2010 2nd International Conference on

    Volume: 1
    Digital Object Identifier: 10.1109/ICCET.2010.5486194
    Publication Year: 2010 , Page(s): V1-226 - V1-231
    Cited by:  Papers (1)

    IEEE Conference Publications

    Network security situation awareness provides the unique high level security view based upon the security alert events. But the complexities and diversities of security alert data on modern networks make such analysis extremely difficult. In this paper, we analyze the existing problems of network security situation awareness system and propose a framework for network security situation awareness based on knowledge discovery. The framework consists of the modeling of network security situation and the generation of network security situation. The purpose of modeling is to construct the formal model of network security situation measurement based upon the D-S evidence theory, and support the general process of fusing and analyzing security alert events collected from security situation sensors. The generation of network security situation is to extract the frequent patterns and sequential patterns from the dataset of network security situation based upon knowledge discovery method and transform these patterns to the correlation rules of network security situation, and finally to automatically generate the network security situation graph. Application of the integrated Network Security Situation Awareness system (Net-SSA) shows that the proposed framework supports for the accurate modeling and effective generation of network security situation. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Security Model Based on Network Business Security

    Wu Kehe ; Zhang Tong ; Li Wei ; Ma Gang
    Computer Technology and Development, 2009. ICCTD '09. International Conference on

    Volume: 1
    Digital Object Identifier: 10.1109/ICCTD.2009.160
    Publication Year: 2009 , Page(s): 577 - 580

    IEEE Conference Publications

    Enterprise network information system is not only the platform for information sharing and information exchanging, but also the platform for enterprise production automation system and enterprise management system working together. As a result, the security defense of enterprise network information system does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business. According to the security defense of enterprise network information system, this paper proposes the "network business security" concept. In this paper, the object of information security is defined in three parts - data security, network system security and network business security, and the network business security model is described. The proposal of the concept "network business security" provides theoretical basis for security defense of enterprise automatic production system and enterprise management information system. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Design and realization of computer network security perception control system

    Zhihu Wang
    Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on

    Digital Object Identifier: 10.1109/ICCSN.2011.6014242
    Publication Year: 2011 , Page(s): 163 - 166

    IEEE Conference Publications

    Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middleware server, security information data perception in real time with deviation of 3-5% was achieved, it proves the feasibility of Computer Network Security Perception Control System. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    CNSSA: A Comprehensive Network Security Situation Awareness System

    Rongrong Xi ; Shuyuan Jin ; XiaoChun Yun ; YongZheng Zhang
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on

    Digital Object Identifier: 10.1109/TrustCom.2011.62
    Publication Year: 2011 , Page(s): 482 - 487

    IEEE Conference Publications

    With tremendous attacks in the Internet, there is a high demand for network analysts to know about the situations of network security effectively. Traditional network security tools lack the capability of analyzing and assessing network security situations comprehensively. In this paper, we introduce a novel network situation awareness tool CNSSA (Comprehensive Network Security Situation Awareness) to perceive network security situations comprehensively. Based on the fusion of network information, CNSSA makes a quantitative assessment on the situations of network security. It visualizes the situations of network security in its multiple and various views, so that network analysts can know about the situations of network security easily and comprehensively. The case studies demonstrate how CNSSA can be deployed into a real network and how CNSSA can effectively comprehend the situation changes of network security in real time. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    The Research on Network Security Visualization Key Technology

    Xiaoyan Li ; Qingxian Wang ; Lin Yang ; Xiangyang Luo
    Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on

    Digital Object Identifier: 10.1109/MINES.2012.236
    Publication Year: 2012 , Page(s): 983 - 988

    IEEE Conference Publications

    Managing complex enterprise networks requires an understanding at a fine granularity than traditional network monitoring. The ability to correlate and visualize the dynamics and inter-relationships among various network components such as hosts, users, and applications is non-trivial. Network security visualization is a highlighted topic of network security research in recent years, The existing research situation of network security visualization is analyzed. the paper first proposed the network security situation awareness model, and analysis network security situation awareness method, at last, and designed and implemented the security situation visualization prototype system based on geographic information systems, network topology graph, attack paths. The security situation data show in multiple views, multi-angle, multi-level display to the user by visualization technology, therefore the performance of the security situation will be more accurate and vivid, assessment of network security situation become timely and accurate, laying the foundation for rapid decision-making. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Establishing the security foundations for network protocol design

    Zebo Feng ; Xiaoping Wu ; Liangli Ma ; Wei Ren
    Communication Technology (ICCT), 2012 IEEE 14th International Conference on

    Digital Object Identifier: 10.1109/ICCT.2012.6511311
    Publication Year: 2012 , Page(s): 789 - 793

    IEEE Conference Publications

    The foundation of network security have not been paid enough concentrations, and the comprehensive considerations for the solution models in network security have not been explored thoroughly. In this paper, we make the first attempt to establish several models for the security of network protocols. We divide the security of network protocols into two folders: the implementation security of network protocols, and the design security of network protocols. Four models are proposed to clarify the security problems: software vulnerability model, scalability model, authentication model, and covert model. We also propose several defense principles for all models. The security reduction is also proposed to transform the solution method for security problems to other available security verification and testing approaches. For example, the implementation security of network protocols is reduced to the security of software implementation for parsing protocols, so that the fuzzy test can be used for verification. The pressure test are used for scalability model. The exploration of the paper can help to stimulate the further discussions on the foundations of network security, especially the design security of network protocols. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A Network Security Situation Analysis framework based on information fusion

    Songmei Zhang ; Shan Yao ; Xin'en Ye ; Chunhe Xia
    Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International

    Volume: 1
    Digital Object Identifier: 10.1109/ITAIC.2011.6030216
    Publication Year: 2011 , Page(s): 326 - 332

    IEEE Conference Publications

    With the rapid development of the Internet, the network structure becomes larger and more complicated and attacking methods are more sophisticated, too. To enhance network security, Network Security Situation Analysis (NSSA) technology is a research hot spot in the network security domain. But at present, the NSSA framework and model which not only analyze the affected results of the network security but also the process how the network security is affected are less. In this paper, a novel NSSA framework is presented. The framework includes two parts: calculate the Network Security Situation Value (NSSV) and discover intrusion processes. NSSA quantitative assesses the impact on network security caused by attacks upon Analytical Hierarchy Process (AHP) and hierarchical network structure. Based on attack classification, intrusion processes discover the process how network security is affected. At last from the experiments results, NSSV exactly changes as attacks take place and the accurate intrusion processes are discovered. The applicability of the framework and algorithms are verified. View full abstract»

  • Open Access

    Cloud computing-based forensic analysis for collaborative network security management system

    Chen, Zhen ; Han, Fuye ; Cao, Junwei ; Jiang, Xin ; Chen, Shuo
    Tsinghua Science and Technology

    Volume: 18 , Issue: 1
    Digital Object Identifier: 10.1109/TST.2013.6449406
    Publication Year: 2013 , Page(s): 40 - 50

    TUP Journals & Magazines

    Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud-based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Design of network security early-warning system based on network defense in depth model

    Liu Shengjian ; Yang Haiyan ; Wang Fengni
    Measurement, Information and Control (ICMIC), 2013 International Conference on

    Volume: 01
    Digital Object Identifier: 10.1109/MIC.2013.6757982
    Publication Year: 2013 , Page(s): 355 - 359

    IEEE Conference Publications

    With the development of networks countermeasure technology, network security early-warning has become a key technology of constructing networks defense in depth architectures. Focusing on network real environment, upgrading comprehensive capacity of the network security defense, a complete set of network security early-warning control mechanism are first discussed; then, based on network defense in depth model, the design ideas, reaching goals, design principle and implementation technology of network security early-warning system are presented; and finally, from the dynamic monitoring, intrusion detection, real-time early-warning and process status tracking, the system function design and the procedure design of main function module are also given. This design model is valuable for guiding the developing practice of network security early-warning system. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A fuzzy forecast method for network security situation based on Markov

    GuangCai Kuang ; XiaoFeng Wang ; LiRu Yin
    Computer Science and Information Processing (CSIP), 2012 International Conference on

    Digital Object Identifier: 10.1109/CSIP.2012.6308971
    Publication Year: 2012 , Page(s): 785 - 789

    IEEE Conference Publications

    At present, network security attacks are numerous. Traditional single defense equipment and testing equipment are unable to meet the requirements of network security under the new circumstances. Therefore, the research on network security situation has become a hot topic in the field of network security. To enhance the accuracy and time effectiveness of the network security situation forecast, a fuzzy prediction method of network security situation based on Markov is proposed in this paper. The method is based on the Markov state transition matrix that depicts the correlation of network security and predicts the security status. By introducing the vulnerability information to build the membership degree of fuzzy security situation for the security status and integrating improved Zadeh formula, the prediction value of the network security situation is obtained. Finally, the effectiveness of the method is shown by the experiment results on KDD CUP99 data and DARPA2000 data. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Securing IPv6 network infrastructure: A new security model

    Choudhary, A.R. ; Sekelsky, A.
    Technologies for Homeland Security (HST), 2010 IEEE International Conference on

    Digital Object Identifier: 10.1109/THS.2010.5654971
    Publication Year: 2010 , Page(s): 500 - 506
    Cited by:  Papers (4)

    IEEE Conference Publications

    Nation's network infrastructure such as the Global Information Grid (GIG) for the Department of Defense (DoD) and the OneNet for the Homeland Security Department are tran-sitioning to the Internet Protocol version 6 (IPv6) per DoD CIO Memorandum of June 2003 and the Office of Management and Budget memorandum OMB-05-22. There exist IPv6 specific security vulnerabilities in these network infrastructures that need to be mitigated in order to achieve security parity with the existing IPv4 operations. From the perspective of the Homeland Security technologies, the existence of additional security vulnerabilities implies a possibility for two pronged threats. First, the IPv6 specific vulnerabilities reduce the security posture of the network infrastructure itself; second, other critical infrastructure sectors that depend on IPv6 need additional protection. For example, the future supervisory control and data acquisition (SCADA) industrial capabilities would increasingly use the IPv6 infrastructure, as would the voice communications, the voice and video collaboration, and sharing of data such as the image data and surveillance and reconnaissance data. This paper presents three contiguous results. First, it briefly presents the new IPv6 capabilities; second, it presents a brief analysis of the security vulnerabilities arising from these capabilities; and third, it presents a new security model for IPv6 network infrastructures that has the potential to mitigate these vulnerabilities. The new model is based on the end-to-end connectivity that is restored in IPv6, thus allowing the use of host based security (HBS) systems together with the perimeter security devices. However, the use of HBS complicates the security trust management. Therefore the third component of the model is introduced, namely a policy based security management (PBSM) approach. The PBSM approach allows the secure deployment of the host based security systems. It provides the capabilities needed to specify - - the trust zones via a set of security policy rules that together specify a trust zone. Hosts belong to one or more trust zones. Accordingly, the host based security policies are derived from the zone security policies for all the zones to which a host belongs. In addition, the PBSM approach has the potential to support more sophisticated security capabilities such as a risk adaptive access control and dynamic security response to a changing operational picture. The capabilities are needed to enable net-centric security operations. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Towards Safe and Optimal Network Designs Based on Network Security Requirements

    Ben Youssef Ben Souayeh, N. ; Bouhoula, A.
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on

    Digital Object Identifier: 10.1109/TrustCom.2012.279
    Publication Year: 2012 , Page(s): 573 - 579

    IEEE Conference Publications

    Network security requirements are generally regarded once network topology is implemented. In particular, once firewalls are emplaced to filter network traffic between different Local Area Networks (LANs). This commun approach may lead to critical situations: First, machines that should not communicate could belong to a same LAN where the network traffics do not pass through the firewall for being filtered. Often overwhelmed by the complexity of security requirements and the growth of networks, network administrators are struggling to resolve such design faults while ensuring not to cause further vulnerabilities. Second, according to network security policy, the required number of LANs, and therefore the number, range and thus, the cost required for both network and security equipments, can be much more reduced than that originally proposed by the network administrator. In this paper, we present an automatic approach that consists on proposing a network topology which is both safe and optimal by taking into account the network security policy, given in a high-level language. The safety property ensures that every prohibited traffic has to cross the firewall to be filtered. The optimal property allows to deduce the necessary and sufficient resources (Sub networks, network switches, firewalls range) to be used. To our best knowledge, such problematic has not been explored in previous works, despite the importance of these challenges. Our method has been implemented using Graph Coloring Theory. The first results are very promising. Experiment conducted on large-scale networks demonstrate the efficiency and the scalability of our approach. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A Quantification Method for Network Security Situational Awareness Based on Conditional Random Fields

    Jianping Li ; Huiqiang Wang
    Computer Sciences and Convergence Information Technology, 2009. ICCIT '09. Fourth International Conference on

    Digital Object Identifier: 10.1109/ICCIT.2009.155
    Publication Year: 2009 , Page(s): 993 - 998
    Cited by:  Papers (1)

    IEEE Conference Publications

    Network security situational awareness(NSSA) has been a hot research spot in the network security domain. In this paper, a quantification method for NSSA based on conditional random fields(CRFs) was proposed. The data of network attacks from intrusion detection system (IDS), the hosts' vulnerabilities and the hosts' states were firstly combined as the network security factors. And then the network security threat degree was defined to quantify the risk of the whole network and classify the attacks. A diverse set of effective features were incorporated in CRFs Model. Finally the experiments on the DARPA 2000 data set generate the explicit network security situational graph. It proves that the method introduced in this paper can represent network risk more accurate and offer a good quantification for the network security situation. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A Formal Framework for Network Security Design Synthesis

    Rahman, M.A. ; Al-Shaer, E.
    Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on

    Digital Object Identifier: 10.1109/ICDCS.2013.70
    Publication Year: 2013 , Page(s): 560 - 570

    IEEE Conference Publications

    Due to the extensive use of Internet services and emerging security threats, most enterprise networks deploy varieties of security devices for controlling resource access based on organizational security requirements. These requirements are becoming more fine-grained, where access control depends on heterogeneous isolation patterns like access deny, trusted communication, and payload inspection. However, organizations are looking to design usable and optimal security configurations that can harden the network security within enterprise budget constraints. This requires analyzing various alternative security architectures in order to find a security design that satisfies the organizational security requirements as well as the business constraints. In this paper, we present ConfigSynth, an automated framework for synthesizing network security configurations by exploring various security design alternatives to provide an optimal solution. The main design alternatives include different kinds of isolation patterns for traffic flows in different segments of the network. ConfigSynth takes security requirements and business constraints along with the network topology as inputs. Then it synthesizes optimal and cost-effective security configurations satisfying the constraints. ConfigSynth also provides optimal placements of different security devices in the network according to the given network topology. ConfigSynth uses Satisfiability Modulo Theories (SMT) for modeling this synthesis problem. We demonstrate the scalability of the tool using simulated experiments. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    The Analysis of XML Technology in Network Security

    Zhou Jing
    Intelligence Information Processing and Trusted Computing (IPTC), 2010 International Symposium on

    Digital Object Identifier: 10.1109/IPTC.2010.18
    Publication Year: 2010 , Page(s): 701 - 704

    IEEE Conference Publications

    This paper described the current network of primary language XML in network applications, introduced its own XML language features and development to illustrate aspects of XML technology in the application of network security and significance. The network security is a systems engineering which is need to carefully consider the security needs of the system, and a variety of security technologies, such as passwords and technology combine to produce a highly efficient, universal, secure network systems. Secondly, this paper analysis of network security architecture and the current network security system for the protection of technical methods used: the network against viruses, configuration, firewall, intrusion detection systems used, Web, Email, BBS's safety monitoring system, vulnerability scanning systems, IP Theft solution, using network monitoring to maintain system security subnet. Finally, the XML technology for network security enabled areas of security, XML has become a field for the safety of a valuable mechanism for exchange of data, related development is related to XML encryption and XML signature. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Research on security strategy for agricultural information network

    Xinlan Jiang ; Wanlin Gao ; Qi Zhang ; Xiang Sun ; Ruihua Wu
    World Automation Congress (WAC), 2010

    Publication Year: 2010 , Page(s): 297 - 301

    IEEE Conference Publications

    In recent years, the agricultural information network construction has made a great progress in China. With the level of network openness improved, the probability of network attacked is increasing. So, it needs a higher demand for network stability and security. Through analyzing the status quo of agricultural information network security and network security defensive strategy architecture, this paper proposes a construction solution of agricultural information network security comprehensive management platform. Based on the different functions and regions of agricultural information network system, this solution optimizes the design and deployment with the way of security management and security technology. It makes the target of systematic and intensive management about agricultural information network security comprehensive defensive architecture is achieved. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    The Study of Network Security Event Correlation Analysis Based on Similar Degree of the Attributes

    Shuying Zhang ; Yue Gao ; Mengqun Zhang ; Jianmei Ge ; Shuangli Wang
    Digital Manufacturing and Automation (ICDMA), 2013 Fourth International Conference on

    Digital Object Identifier: 10.1109/ICDMA.2013.375
    Publication Year: 2013 , Page(s): 1565 - 1569

    IEEE Conference Publications

    This paper studied the related theories of the network security event correlation analysis methods, and proposed the network security event correlation analysis method based on similar degree of the attributes. a detailed description and analysis of the method is gived in this paper, the method can realize the classification and merge of network security events according to the attributes similar degree of network security events. The similar degree of security events are identified by the similar degrees of characteristic attributes. It can not only remove redundant safety incidents, but also can compress security event number. Thus, it can effectively improve the network administrator's security incident analysis efficiency. The experimental results show that: the method is suitable for the massive security event information analysis and aggregation, can effectively reduce the number of security incidents, has a certain value. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Using ITU-T X.805 for comprehensive network security assessment and planning

    McGee, A.R. ; Chandrashekhar, U. ; Richman, S.H.
    Telecommunications Network Strategy and Planning Symposium. NETWORKS 2004, 11th International

    Digital Object Identifier: 10.1109/NETWKS.2004.1341856
    Publication Year: 2004 , Page(s): 273 - 278
    Cited by:  Papers (1)

    IEEE Conference Publications

    In the wake of recent events, network security and reliability have become top issues for service providers and enterprises. The worldwide cost of cyber attacks is estimated to have been in the $145 billion dollar range for 2003. 2003 was also regarded as the "worst year ever" for computer viruses and worms; in 2001 the Code Red worm took several days to create widespread damage, whereas Slammer in 2003 had significant impact in just minutes. Over 90% of network attacks resulting in significant financial loss originate from inside a network's perimeter. Unfortunately, there appears to be no end in sight to these threats to network security; in fact, there is an increasing trend of attacking financial resources in addition to computing resources. The newly ratified ITU-T Recommendation X.805 "security architecture for systems providing end-to-end communications" was developed as the framework for the architecture and dimensions in achieving end-to-end security of distributed applications. It provides a comprehensive, multilayered, end-to-end network security framework across eight security dimensions in order to combat network security threats. We introduce the X.805 standard and describe how it can be applied to all phases of a network security program. We also provide examples of the business impact of network security vulnerabilities and the application of X.805 for network security assessments. Enterprises and service providers alike should use X.805 to provide a rigorous approach to network security throughout the entire lifecycle of their security programs. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Quantification of Network Security Situational Awareness Based on Evolutionary Neural Network

    Ying Liang ; Hui-Qiang Wang ; Ji-Bao Lai
    Machine Learning and Cybernetics, 2007 International Conference on

    Volume: 6
    Digital Object Identifier: 10.1109/ICMLC.2007.4370711
    Publication Year: 2007 , Page(s): 3267 - 3272

    IEEE Conference Publications

    The proposal of network security situational awareness (NSSA) research means a breakthrough and an innovation to the traditional network security technologies, and it has become a new hot research topic in network security field. Combined with evolutionary strategy and neural network, a quantitative method of network security situational awareness is proposed in this paper. Evolutionary strategy is used to optimize the parameters of neural network, and then the evolutionary neural network model is established to extract the network security situational factors, so the quantification of network security situation is achieved. Finally simulated experiment is done to validate that the evolutionary neural network model can extract situational factors and the model has better generalization ability, which supports the network security technical technologies greatly. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Intelligence security home network

    Volner, R. ; Pousek, L.
    Security Technology, 2003. Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on

    Digital Object Identifier: 10.1109/CCST.2003.1297531
    Publication Year: 2003 , Page(s): 30 - 37
    Cited by:  Papers (3)

    IEEE Conference Publications

    The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent Web switching. Many intelligent systems focus on a specific security service, function, or device, and do not provide true end-to-end service network intelligence. True security network intelligence requires more than a set of disconnected elements, it requires an interconnecting and functionally coupled architecture that enables the various functional levels to interact and communicate with each other. We propose a uniform work for understanding end-to-end communication security network intelligence (CSNI), which is defined as the ability of a network to act appropriately in a changing environment. We consider an appropriate action to be one that increases the optimal and efficient use of network resources in delivering services, and we define success as the achievement of behaviour sub-goals that support the service provider's ultimate goals, which are defined external to the network system. The work presented incorporates the functional elements of intelligence into computational modules and interconnects the modules into networks and hierarchies that have spatial, logical, and temporal properties. Based on the work proposed, we describe an end-to-end multiservice network application spanning the network security management layer, optical layer, switching/routing layer, security services layer, and other layers. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Security situation analysis and prediction system for large-scale network SSAP

    Weihong Han ; QingGuang Wang
    Computing and Convergence Technology (ICCCT), 2012 7th International Conference on

    Publication Year: 2012 , Page(s): 1125 - 1129

    IEEE Conference Publications

    SSAP is developed for national backbone networks, large network operators, large enterprises and other large-scale networks. The system collects, interprets and displays the security factors which cause changes of network situation, and predicts the future development trend of these security factors. This paper describes its architecture and key technologies: security data integration technology for distributed heterogeneous network, association analysis technology oriented the major network security events, real-time analysis technology based on the data flow and multi-dimensional analysis for network security data, network security situation prediction technology, and so on. The performance tests show that SSAP has high real-time and accuracy in security situation analysis and trend prediction. The system meets the demands of analysis and prediction for large-scale network security situation. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A network security evaluation method based on fuzzy and RST

    Lijuan, Zhang ; Wang Qingxian
    Education Technology and Computer (ICETC), 2010 2nd International Conference on

    Volume: 2
    Digital Object Identifier: 10.1109/ICETC.2010.5529440
    Publication Year: 2010 , Page(s): V2-40 - V2-44

    IEEE Conference Publications

    The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the comprehensive network security risks and take effective security measures. A network evaluation model and the corresponding fuzzy algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The model combined with the importance of the security measure, environment and the key nodes. The evaluation method based on RST is used to evaluate the key nodes and the fuzzy mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown by experimental results that this system provides a valuable model and algorithms to help to find the security rules, adjust the security measure, improve the security performance and design the appropriate security risk evaluation and management tools. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Dynamic awareness of network security situation based on stochastic game theory

    Liang Ying ; Li Bingyang ; Wang Huiqiang
    Software Engineering and Data Mining (SEDM), 2010 2nd International Conference on

    Publication Year: 2010 , Page(s): 101 - 105

    IEEE Conference Publications

    Stochastic game theory is proposed to apply in the research on network security situational awareness (NSSA), which is a research focus in network security field at present. A novel dynamic awareness method of network security situation (NSS) based on analyses of network service states is proposed in this paper. Realizing situation awareness is a dynamic process, and the diverse states of network services are just direct mirrors of the whole network security situation. Network security situation reflects what is happening in the network, including both the offense and defense behaviors in it. Stochastic game model of network security system is constructed in this paper, and network security situation is quantified by the game mathematical formulation, costs or rewards of attackers and defenders are established, and finally non-linear programming is used to compute the Nash equilibrium points, at which point both of the two sides get a balance between their benefits. Network security situation can then be dynamically achieved by visualizing the diverse metrics information of network services at Nash equilibrium during the operating of network system. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    The problems in campus network information security and its solutions

    Cuihong Wu
    Industrial and Information Systems (IIS), 2010 2nd International Conference on

    Volume: 1
    Digital Object Identifier: 10.1109/INDUSIS.2010.5565862
    Publication Year: 2010 , Page(s): 261 - 264
    Cited by:  Papers (1)

    IEEE Conference Publications

    In the Age of Information, network education pays more attention to the application of IT technology and the training of talents, which makes learning more of customization and of opening up. In order to better enable learners to go beyond the limitations of space and time to acquire knowledge; in order to provide excellent learning environment for greater freedom and greater choice of learning activities space, the project to building campus network has become the basis of all university building work. It is directly related to the quality and level of their teaching and scientific research work. The campus network has a number of tasks such as teaching, research, management and communication with the outside. Therefore, the issue of network security has become a priority to campus network management. Obviously, the current Internet is convenient but at the same time it is unsafe. As part of the Internet and the unique attributes of campus network, it is more easily attacked when enjoying the service provided by the Internet. This paper starts from the current security status of the campus network, analyzing threatens to campus network security and strategies to maintenance of network security, so as to establish a suitable campus network security system, and introduce some current popular campus network information security solutions. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    The network security situation predicting technology based on the small-world echo state network

    Fenglan Chen ; Yongjun Shen ; Guidong Zhang ; Xin Liu
    Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on

    Digital Object Identifier: 10.1109/ICSESS.2013.6615328
    Publication Year: 2013 , Page(s): 377 - 380

    IEEE Conference Publications

    Network security model is a complex nonlinear system, and the network security situation value possesses the chaotic characters. The predictability of these situation values is of great significance for network security management. This paper proposes a novel prediction method, which is based on the echo state networks (ESNs) with small-world property. We can utilize this method to predict the network security situation after training and testing the acquired historical attack records. Verified by simulation results, the method has a higher prediction accuracy and speed compared with the conventional ESNs. Therefore it can reflect the network security situation in the future timely and accurately. We believe that this achievement will provide some practical guides for network administrators to supervise the network status. View full abstract»

Skip to Results

SEARCH HISTORY

Search History is available using your personal IEEE account.

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.