Skip to main content

An Improved Assessment Method for the Network Security Risk

  • Conference paper
  • First Online:
  • 932 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11910))

Abstract

Network security risk assessment is very important to improve the network security. The existing network security risk assessment method based on HMM is not enough to estimate the network risk, because some methods manually set model parameters or calculate the overall network risk only using the host node. Therefore, a network security risk assessment method based on improved Hidden Markov Model (I-HMM) is proposed. Firstly, the observation sequence acquisition of the model is optimized by calculating the quality of the sampling period alarm. Secondly, the model parameters are improved through the learning algorithm. Finally, the reliability and accuracy of the network security risk measurement are increased by introducing the network node correlation. The final results by the simulation experiment shows that the network security risk assessment method based on I-HMM has certain applicability, can accurately reflect the security risk status of the network, and can distinguish the influence degree of different hosts on network risk.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Guang, K., Guangming, T., Xia, D.: A network security situation assessment method based on attack intention perception. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE (2016)

    Google Scholar 

  2. Kun, W., Hui, Q., Haopu, Y.: Network security situation evaluation method based on attack intention recognition. In: International Conference on Computer Science & Network Technology. IEEE (2016)

    Google Scholar 

  3. Samy, G.N., Shanmugam, B., Maarop, N.: Information security risk assessment framework for cloud computing environment using medical research design and method. Adv. Sci. Lett. 24(1), 739–743 (2018)

    Article  Google Scholar 

  4. Li, S., Bi, F., Chen, W.: An improved information security risk assessments method for cyber-physical-social computing and networking. IEEE Access 6, 10311–10319 (2018)

    Article  Google Scholar 

  5. Li, X., Zhao, H.: Network security situation assessment based on HMM-MPGA. In: International Conference on Information Management, pp. 57–63. IEEE (2016)

    Google Scholar 

  6. Hamid, T., Al-Jumeily, D., Hussain, A.: Cyber security risk evaluation research based on entropy weight method. In: 2016 9th International Conference on Developments in eSystems Engineering (DeSE). IEEE (2016)

    Google Scholar 

  7. Huang, K., Zhou, C., Tian, Y.C.: Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks. In: 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–6 (2017)

    Google Scholar 

  8. Liu, S., Liu, Y.: Network security risk assessment method based on HMM and attack graph model. IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 517–522. IEEE (2016)

    Google Scholar 

  9. Xi, R.-R., Yun, X.-C., Zhang, Y.-Z.: An improved quantitative evaluation method for network security. Chin. J. Comput. 38(4), 749–758 (2015)

    MathSciNet  Google Scholar 

  10. Pietras, M., Klęsk, P.: FPGA implementation of logarithmic versions of Baum-Welch and Viterbi algorithms for reduced precision hidden Markov models. Bull. Pol. Acad. Sci. Tech. Sci. 65(6), 935–947 (2017)

    Google Scholar 

  11. Wang, Z., Lu, Y., Li, J.: Network security risk assessment based on node correlation. J. Phys.: Conf. Ser. 1069(1), 012073 (2018)

    Google Scholar 

  12. Li, Y., Liu, S., Yu, Y.: Analysis of network vulnerability under joint node and link attacks. Mater. Sci. Eng. Conf. Ser. 322(5), 052052 (2018)

    Article  Google Scholar 

  13. Wangen, G.: Information security risk assessment: a method comparison. Computer 50(4), 52–61 (2017)

    Article  Google Scholar 

  14. Doynikova, E., Kotenko, I.: CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection. In: Euromicro International Conference on Parallel, Distributed and Network-Based Processing, pp. 346–353. IEEE (2017)

    Google Scholar 

  15. Coffey, K., Smith, R., Maglaras, L.: Vulnerability analysis of network scanning on SCADA systems. Secur. Commun. Netw. 2018(4), 1–21 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jingjing Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hu, J., Guo, S., Meng, F., Hu, D., Shi, Z. (2019). An Improved Assessment Method for the Network Security Risk. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2019. Lecture Notes in Computer Science(), vol 11910. Springer, Cham. https://doi.org/10.1007/978-3-030-34139-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34139-8_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34138-1

  • Online ISBN: 978-3-030-34139-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics