By Topic

A Novel Approach to Cyberspace Security Situation Based on the Vulnerabilities Analysis

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Wei Hu ; Department of Electronic Engineering, ShangHai JiaoTong University, ShangHai, 200030, China. huwei ; Jianhua Li ; Jianjun Shi

Present-day network security management service is unable to provide useful security situation or risk estimation for administrators, or to help administrators to make right and timely decisions based on current state of the network security. These disadvantages lead to risks which exist in network security management applications and accordingly cause a loss. In this paper, we make use of the HoneyNet dataset and adopt statistic analysis to find the vulnerabilities of the services which the hosts provide in the network system. According to the network topology, the host layout and the relations among services, the paper presents a novel time-divided and hierarchical approach to achieve the current situation of network security. The approach can be applied to modeling security situation and achieve the expressions of the security situation of the network system. Coupled with the statistical data, the paper shows the simulation curves of the security situation in different periods through a great deal of calculation. The analysis of the simulation result proves the algorithm efficient and provides us for our future implementation with the academic foundation of the evaluation of the security situation

Published in:

2006 6th World Congress on Intelligent Control and Automation  (Volume:1 )

Date of Conference:

0-0 0