Skip to main navigation Skip to search Skip to main content

Multiple behavior information fusion based quantitative threat evaluation

Research output: Contribution to journalArticlepeer-review

13 Scopus citations

Abstract

How to evaluate network security threat quantitatively is one of key issues in the field of network security, which is vital for administrators to make decision on the security of computer networks. A novel model of security threat evaluation with a series of quantitative indices is proposed on the analysis of prevalent network intrusions. This model is based on multiple behavior information fusion and two indices of privilege validity and service availability that are proposed to evaluate the impact of prevalent network intrusions on system security, so as to provide security evolution over time, i.e., monitor security changes with respect to modification of security factors. The Markov model and the algorithm of D-S evidence reasoning are proposed to measure these two indices, respectively. Compared with other methods, this method mitigates the impact of unsuccessful intrusions on threat evaluation. It evaluates the impact of important intrusions on system security comprehensively and helps administrators to insight into intrusion steps, determine security state and identify dangerous intrusion traces. Testing in a real network environment shows that this method is reasonable and feasible in alleviating the tremendous task of data analysis and facilitating the understanding of the security evolution of the system for its administrators.

Original languageEnglish
Pages (from-to)218-231
Number of pages14
JournalComputers and Security
Volume24
Issue number3
DOIs
StatePublished - May 2005

Keywords

  • Evaluation index
  • Evidence reasoning
  • Information fusion
  • Markov model
  • Network security
  • Threat evaluation

Fingerprint

Dive into the research topics of 'Multiple behavior information fusion based quantitative threat evaluation'. Together they form a unique fingerprint.

Cite this