Network security situation assessment based on data fusion

Liu Mixia, Zhang Qiuyu, Zhao Hong, Yu Dongmei

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

Network security situation assessment can project the next behavior of the network by describing the current state. Security events from IDS, firewall, and other security tools are currently growing at a rapid pace. However, most intrusion event researches focus on IDS alerts, overlooking other intrusion evidence from other security tools, or they make simple integration of various security tools not inflecting the whole network state. In this paper, we described network security from the view of system. First, network situation elements are analyzed. Second, we research their correlations and present system architecture of network security situation. Third, multi-sensor correlation algorithms are analyzed that Colored Petri net is used for describing the changing of system state after arrival of new events and D-S Theory of Evidence is used for combining the different evidence. Then, we report the experimental results on the DARPA 2000 DDoS attack scenarios and analyze them. At last, we conclude our work and present next research goal.

Original languageEnglish
Title of host publicationProceedings - 1st International Workshop on Knowledge Discovery and Data Mining, WKDD
Pages542-545
Number of pages4
DOIs
StatePublished - 2008
Externally publishedYes
Event1st International Workshop on Knowledge Discovery and Data Mining, WKDD - Adelaide, Australia
Duration: 23 Jan 200824 Jan 2008

Publication series

NameProceedings - 1st International Workshop on Knowledge Discovery and Data Mining, WKDD

Conference

Conference1st International Workshop on Knowledge Discovery and Data Mining, WKDD
Country/TerritoryAustralia
CityAdelaide
Period23/01/0824/01/08

Fingerprint

Dive into the research topics of 'Network security situation assessment based on data fusion'. Together they form a unique fingerprint.

Cite this