Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 3407642, 19 pages
https://doi.org/10.1155/2017/3407642
Research Article

Quantitative Method for Network Security Situation Based on Attack Prediction

1Zhengzhou Information Science and Technology Institute, Zhengzhou 450001, China
2Henan Key Laboratory of Information Security, Zhengzhou 450001, China
3Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
4Key Laboratory of Information Network Security, Third Research Institute, Ministry of Public Security, Shanghai 200031, China

Correspondence should be addressed to Hao Hu; moc.361@809_hhjjw

Received 18 January 2017; Accepted 14 May 2017; Published 3 July 2017

Academic Editor: Xiaojiang Du

Copyright © 2017 Hao Hu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. S. Fava, S. R. Byers, and S. J. Yang, “Projecting cyberattacks through variable-length Markov models,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 359–369, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. S. J. Yang, S. Byers, J. Holsopple, B. Argauer, and D. Fava, “Intrusion activity projection for cyber situational awareness,” in Proceedings of the IEEE International Conference on Intelligence and Security Informatics (IEEE ISI '08), pp. 167–172, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. Y.-h. Hao, J.-h. Han, Y. Lin, and L. Liu, “Vulnerability of complex networks under three-level-tree attacks,” Physica A. Statistical Mechanics and its Applications, vol. 462, pp. 674–683, 2016. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  4. O. H. Alhazmi, Y. K. Malaiya, and I. Ray, “Measuring, analyzing and predicting security vulnerabilities in software systems,” Computers and Security, vol. 26, no. 3, pp. 219–228, 2007. View at Publisher · View at Google Scholar · View at Scopus
  5. M. R. Endsley and M. M. Robertson, “Design and evaluation for situation awareness enhancement,” in Proceedings of the Human Factors Society 32nd Annual Meeting, vol. 40, pp. 1077–1081, Human Factors Society, Santa Monica, CA, USA, 1988. View at Publisher · View at Google Scholar
  6. T. Bass, “Intrusion detection systems multisensory data fusion: creating cyberspace situational awareness,” Communications of the ACM, vol. 43, no. 4, pp. 99–105, 2000. View at Google Scholar
  7. J. Ye, S. Dobson, and S. McKeever, “Situation identification techniques in pervasive computing: a review,” Pervasive and Mobile Computing, vol. 8, no. 1, pp. 36–66, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. L. Wang, H. Zou, J. Su, L. Li, and S. Chaudhry, “An ARIMA-ANN hybrid model for time series forecasting,” Systems Research and Behavioral Science, vol. 30, no. 3, pp. 244–259, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. P. Ge, J. Wang, P. Ren, H. Gao, and Y. Luo, “A new improved forecasting method integrated fuzzy time series with the exponential smoothing method,” International Journal of Environment and Pollution, vol. 51, no. 3-4, pp. 206–221, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. W. Zhang, T. Yang, Y. Q. Shi, X. N. Peng, and D. B. Hu, “A chaotic characteristics identification method for network security situation time series,” Journal of information and computational science, vol. 9, no. 5, pp. 1548–7741, 2012. View at Google Scholar
  11. Z.-Y. Qu, Y.-Y. Li, and Peng-Li, “A network security situation evaluation method based on D-S evidence theory,” in Proceedings of the 2nd Conference on Environmental Science and Information Application Technology (ESIAT '10), pp. 496–499, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. W. Hu, J. Li, X. Jiang, Y. Zhang, and X. Chen, “Hierarchical algorithm for cyberspace situational awareness based on analytic hierarchy process,” High Technology Letters, vol. 13, no. 3, pp. 291–296, 2007. View at Google Scholar · View at Scopus
  13. X. Qin and W. Lee, “Discovering Novel Attack Strategies from INFOSEC Alerts,” in Proceedings of the Computer Security (ESORICS '04), vol. 3193 of Lecture Notes in Computer Science, pp. 439–456, Springer Berlin Heidelberg, Sophia-Antipolis, France. View at Publisher · View at Google Scholar
  14. Z. Cai, Q. Zhang, and Y. Gan, “Intrusion intention recognition and response based on weighed plan knowledge graph,” Computer Modelling & New Technologies, vol. 18, no. 12B, pp. 151–157, 2014. View at Google Scholar
  15. D. Yu and D. Frincke, “Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net,” Computer Networks, vol. 51, no. 3, pp. 632–654, 2007. View at Publisher · View at Google Scholar · View at Scopus
  16. O. B. Fredj, “A realistic graph-based alert correlation system,” Security and Communication Networks, vol. 8, no. 15, pp. 2477–2493, 2015. View at Publisher · View at Google Scholar · View at Scopus
  17. S.-C. Liu and Y. Liu, “Network security risk assessment method based on HMM and attack graph model,” in Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD '16), pp. 517–522, June 2016. View at Publisher · View at Google Scholar · View at Scopus
  18. M. Ghasemigol, A. Ghaemi-Bafghi, and H. Takabi, “A comprehensive approach for network attack forecasting,” Computers and Security, vol. 58, pp. 83–105, 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. S. Yi, Y. Peng, Q. Xiong et al., “Overview on attack graph generation and visualization technology,” in Proceedings of the 2013 IEEE International Conference on Anti-Counterfeiting, Security and Identification (ASID '13), October 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. N. Liu, J. Zhang, H. Zhang, and W. Liu, “Security assessment for communication networks of power control systems using attack graph and MCDM,” IEEE Transactions on Power Delivery, vol. 25, no. 3, pp. 1492–1500, 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. G. Chen, D. Shen, C. Kwan, J. B. Cruz Jr., and M. Kruger, “Game theoretic approach to threat prediction and situation awareness,” in Proceedings of the 2006 9th International Conference on Information Fusion (FUSION '06), Florence, Italy, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  22. H. Wang, Y. Liang, and B. Li, “Dynamic awareness of network security situation based on stochastic game theory,” in Proceedings of the 2nd IEEE International Conference on Software Engineering and Data Mining, pp. 101–105, Chengdu, China, 2010.
  23. Y. Wang, J. Li, K. Meng, C. Lin, and X. Cheng, “Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets,” Security and Communication Networks, vol. 6, no. 1, pp. 89–99, 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. K.-W. Lye and J. M. Wing, “Game strategies in network security,” International Journal of Information Security, vol. 4, no. 1-2, pp. 71–86, 2005. View at Publisher · View at Google Scholar · View at Scopus
  25. X. Liang and Y. Xiao, “Game Theory for Network Security Communications surveys tutorials,” Game Theory for Network Security Communications surveys tutorials, vol. 15, no. 1, pp. 482–486, 2013. View at Google Scholar
  26. J. Brynielsson and S. Arnborg, “Bayesian games for threat prediction and situation analysis,” in Proceedings of the Seventh International Conference on Information Fusion (FUSION '04), pp. 1125–1132, July 2004. View at Scopus
  27. A. K. Nandi, H. R. Medal, and S. Vadlamani, “Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model,” Computers and Operations Research, vol. 75, no. 11, pp. 118–131, 2016. View at Publisher · View at Google Scholar · View at Scopus
  28. M. Schiffman, “Common Vulnerability Scoring System (CVSS),” https://www.first.org/available on cvss. html.
  29. X. Ou, S. Govindavajhala, and A. W. Appel, “MULVAL: a logic-based network security analyzer,” in Proceedings of the 14th Usenix Security Symposium, pp. 113–117, Baltimore, MD, USA, 2005. View at Publisher · View at Google Scholar
  30. National Vulnerability Database, 2016, https://web.nvd.nist.gov/view/vuln/search.
  31. ArcSight, “ESM: Enterprise security manager [OL],” http://cn.linkedin.com/topic/enterprise-security-manager. View at Publisher · View at Google Scholar