吉林大学学报(工学版) ›› 2016, Vol. 46 ›› Issue (2): 556-567.doi: 10.13229/j.cnki.jdxbgxb201602034

• Orginal Article • Previous Articles     Next Articles

Hierarchical situation evaluation model for network information content security incidents

GE Lin, JI Xin-Sheng, JIANG Tao   

  1. National Digital Switching System Engineering and Technological Research Center, Zhengzhou 450002, China
  • Received:2014-02-27 Online:2016-02-20 Published:2016-02-20

Abstract: To solve the problem of situation evaluation for network information content security incidents, a hierarchical situation evaluation model parameter calculation method are proposed, through the analysis on the multi-dimension characteristics of network information content security incidents. The model uses hierarchical structure and calculates the situation assessment values of incident level, area level and system level respectively. Among these levels, the incident level is based on the behavioral characteristics and content characteristics of the incident characteristics; the area level is according to the relationship characteristics and location characteristics, and system level integrates the involved area levels. The method to calculate the parameters is defined. Simulation results show that the model and method is feasible and reliable. It can reflect the impaction of incidents effectively and grasp the change rules of the incidents in situation evaluation of information content security incidents.

Key words: information processing technology, information content security incidents, situation evaluation, hierarchical

CLC Number: 

  • TP393
[1] GB/Z 20986-2007.信息安全事件分类分级指南[S].
[2] 中国互联网络信息中心. 2013年中国网民信息安全状况研究报告[R]. 中国互联网络信息中心, 中国, 2013.
[3] 陈训逊, 方滨兴, 胡铭曾, 等. 一个网络信息内容安全的新领域-网络信息渗透检测技术[J]. 通信学报, 2004, 25(7): 185-191.
Chen Xun-xun, Fang Bin-xing, Hu Ming-zeng, et al. A new field in security of internet information and content-network information penetration detection technology[J]. Journal of China Institute of Communications, 2004, 25(7): 185-191.
[4] Fang Bin-xing, Guo Yun-chuan, Zhou Yuan. Information content security on the Internet: the control model and its evaluation[J]. Science China, 2010, 53(1): 30-49.
[5] 万源. 基于语义统计分析的网络舆情挖掘技术研究[D]. 武汉:武汉理工大学计算机学院, 2012.
Wan Yuan. Research on mining of internet public opinion based on semantic and statistic analysis[D]. Wuhan :School of Computer Science and Technology,Wuhan University of Technology, 2012.
[6] Barroso N, Lopez de Ipina K L, Ezeiza A, et al. An ontology-driven semantic speech recognition system for security tasks[C]//Proceeding of IEEE International Carnahan Conference on Security Technology, Barcelona,2011:1-6.
[7] Roesch M. Snort-lightweight intrusion detection for networks[C]//Proceedings of the 13th System Administration Conference, Seattle,1999: 229-238.
[8] Porras P A, Fong M W, Valdes A. A mission-impact-based approach to INFOSEC alarm correlation[C]//Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, Zurich,2002:95-114.
[9] Hariri S, Qu G Z, Dharmagadda T, et al. Impact analysis of faults and attacks in large-scale networks[J]. IEEE Security and Privacy, 2003, 1(5): 49-54.
[10] 陈秀真, 郑庆华, 管晓宏, 等. 层次化网络安全威胁态势量化评估方法[J]. 软件学报, 2006, 17( 4) : 885-897.
Chen Xiu-zhen, Zheng Qing-hua, Guan Xiao-hong, et al. Quantitative hierarchical threat evaluation model for network security[J]. Journal of Software, 2006, 17(4): 885- 897.
[11] Arnes A, Valeur F, Vigna G, et al. Using hidden markov models to evaluate the risk of intrusions[C]//Proceedings of the International Symposium on the Recent Advances in Intrusion Detection, Hamburg,2006:145-164.
[12] 韦勇, 连一峰, 冯登国. 基于信息融合的网络安全态势评估模型[J]. 计算机研究与发展,2009, 46(3): 353-362.
Wei Yong, Lian Yi-feng, Feng Deng-guo. A network security situational awareness model based on information fusion[J]. Journal of Computer Research and Development, 2009, 46(3): 353-362.
[13] Ahmed M S, Al-Shaer E, Taibah M, et al. Objective risk evaluation for automated security management[J]. Journal of Network and Systems Management, 2011, 19(3): 343-366.
[14] IEEE VAST 2008 Challenge[EB/OL] .[2008-03-15] https://www.cs.umd.edu/hcil/VASTcha-llenge08.
[15] Enron Email Dataset[EB/OL] .[2011-04-02] https://www.cs.cmu.edu/~enron/.
[1] YING Huan,LIU Song-hua,TANG Bo-wen,HAN Li-fang,ZHOU Liang. Efficient deterministic replay technique based on adaptive release strategy [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1917-1924.
[2] LIU Zhong-min,WANG Yang,LI Zhan-ming,HU Wen-jin. Image segmentation algorithm based on SLIC and fast nearest neighbor region merging [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1931-1937.
[3] SHAN Ze-biao,LIU Xiao-song,SHI Hong-wei,WANG Chun-yang,SHI Yao-wu. DOA tracking algorithm using dynamic compressed sensing [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1938-1944.
[4] ZHONG Wei, JUAN Zhi-cai, SUN Bao-feng. Hierarchical hub location model for integration of urban and rural public transport in an incomplete network [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1387-1397.
[5] SUN Xiao-ying, HU Ze-zheng, YANG Jin-peng. Assessment method of electromagnetic pulse sensitivity of vehicle engine system based on hierarchical Bayesian networks [J]. 吉林大学学报(工学版), 2018, 48(4): 1254-1264.
[6] YAO Hai-yang, WANG Hai-yan, ZHANG Zhi-chen, SHEN Xiao-hong. Reverse-joint signal detection model with double Duffing oscillator [J]. 吉林大学学报(工学版), 2018, 48(4): 1282-1290.
[7] QUAN Wei, HAO Xiao-ming, SUN Ya-dong, BAI Bao-hua, WANG Yu-ting. Development of individual objective lens for head-mounted projective display based on optical system of actual human eye [J]. 吉林大学学报(工学版), 2018, 48(4): 1291-1297.
[8] CHEN Mian-shu, SU Yue, SANG Ai-jun, LI Pei-peng. Image classification methods based on space vector model [J]. 吉林大学学报(工学版), 2018, 48(3): 943-951.
[9] CHEN Tao, CUI Yue-han, GUO Li-min. Improved algorithm of multiple signal classification for single snapshot [J]. 吉林大学学报(工学版), 2018, 48(3): 952-956.
[10] HE Xiang-kun, JI Xue-wu, YANG Kai-ming, WU Jian, LIU Ya-hui. Tire slip control based on integrated-electro-hydraulic braking system [J]. 吉林大学学报(工学版), 2018, 48(2): 364-372.
[11] MENG Guang-wei, LI Rong-jia, WANG Xin, ZHOU Li-ming, GU Shuai. Analysis of intensity factors of interface crack in piezoelectric bimaterials [J]. 吉林大学学报(工学版), 2018, 48(2): 500-506.
[12] LIN Jin-hua, WANG Yan-jie, SUN Hong-hai. Improved feature-adaptive subdivision for Catmull-Clark surface model [J]. 吉林大学学报(工学版), 2018, 48(2): 625-632.
[13] WANG Ke, LIU Fu, KANG Bing, HUO Tong-tong, ZHOU Qiu-zhan. Bionic hypocenter localization method inspired by sand scorpion in locating preys [J]. 吉林大学学报(工学版), 2018, 48(2): 633-639.
[14] YU Hua-nan, DU Yao, GUO Shu-xu. High-precision synchronous phasor measurement based on compressed sensing [J]. 吉林大学学报(工学版), 2018, 48(1): 312-318.
[15] WANG Fang-shi, WANG Jian, LI Bing, WANG Bo. Deep attribute learning based traffic sign detection [J]. 吉林大学学报(工学版), 2018, 48(1): 319-329.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!