TY - GEN
T1 - Network security situation assessment based on data fusion
AU - Mixia, Liu
AU - Qiuyu, Zhang
AU - Hong, Zhao
AU - Dongmei, Yu
PY - 2008
Y1 - 2008
N2 - Network security situation assessment can project the next behavior of the network by describing the current state. Security events from IDS, firewall, and other security tools are currently growing at a rapid pace. However, most intrusion event researches focus on IDS alerts, overlooking other intrusion evidence from other security tools, or they make simple integration of various security tools not inflecting the whole network state. In this paper, we described network security from the view of system. First, network situation elements are analyzed. Second, we research their correlations and present system architecture of network security situation. Third, multi-sensor correlation algorithms are analyzed that Colored Petri net is used for describing the changing of system state after arrival of new events and D-S Theory of Evidence is used for combining the different evidence. Then, we report the experimental results on the DARPA 2000 DDoS attack scenarios and analyze them. At last, we conclude our work and present next research goal.
AB - Network security situation assessment can project the next behavior of the network by describing the current state. Security events from IDS, firewall, and other security tools are currently growing at a rapid pace. However, most intrusion event researches focus on IDS alerts, overlooking other intrusion evidence from other security tools, or they make simple integration of various security tools not inflecting the whole network state. In this paper, we described network security from the view of system. First, network situation elements are analyzed. Second, we research their correlations and present system architecture of network security situation. Third, multi-sensor correlation algorithms are analyzed that Colored Petri net is used for describing the changing of system state after arrival of new events and D-S Theory of Evidence is used for combining the different evidence. Then, we report the experimental results on the DARPA 2000 DDoS attack scenarios and analyze them. At last, we conclude our work and present next research goal.
UR - http://www.scopus.com/inward/record.url?scp=50949095740&partnerID=8YFLogxK
U2 - 10.1109/WKDD.2008.35
DO - 10.1109/WKDD.2008.35
M3 - 会议稿件
AN - SCOPUS:50949095740
SN - 0769530907
SN - 9780769530901
T3 - Proceedings - 1st International Workshop on Knowledge Discovery and Data Mining, WKDD
SP - 542
EP - 545
BT - Proceedings - 1st International Workshop on Knowledge Discovery and Data Mining, WKDD
T2 - 1st International Workshop on Knowledge Discovery and Data Mining, WKDD
Y2 - 23 January 2008 through 24 January 2008
ER -