Advertisement

Automatic Security Baseline Verification Method Based on SCAP and Cloud Scanning

  • Yanzhou ChenEmail author
  • Qi Wang
  • Meng Sun
  • Peng Chen
  • Zhizhong Qiao
  • Zhangguo Chen
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 905)

Abstract

With the development of power networks, automated verification of security baselines has become increasingly important. Traditional verification methods have disadvantages such as low efficiency, inability to centralize management, and difficulty in maintaining and upgrading. In this paper, we proposed a method of automatically checking the security baseline based on the security baseline model and using the SCAP standard combined with efficient Cloud scanning technology. Our method not only improves efficiency, but also facilitates centralized management and maintenance of upgrades.

Keywords

Automatic security baseline verification SCAP Cloud scanning Power networks 

Notes

Acknowledgement

This work is supported by Science and Technology Project of China Southern Power Grid Co., Ltd. “Research and Demonstration of Key Technologies of Network Security Situational Awareness in Power Monitoring System” (No. ZDKJXM20170002).

References

  1. 1.
    Zhang, X., Chen, X.H., Liu, X.: Construction of information security baseline standardization system for power systems. Electric Power Inf. Commun. Technol. 11(11), 110–114 (2013). (in Chinese)Google Scholar
  2. 2.
    Gui, Y.H.: Study and applications of operation system security baseline. Comput. Secur. 10, 11–15 (2011)Google Scholar
  3. 3.
    Kozlovszky, M.: Cloud security monitoring and vulnerability management. Crit. Infrastruct. Protect. Res. 12, 265–269 (2016)Google Scholar
  4. 4.
    Chen, Z. H.: Security baseline management in the enterprise application. Computer Security, 2013Google Scholar
  5. 5.
    Gao, S., Wang, Q.Q.: A new security baseline reinforcement method for the power information system. Appl. Mech. Mater. 2407–2411 (2013)CrossRefGoogle Scholar
  6. 6.
    Wang, K., Lu, Y.J.: Automated baseline inspection of big data components. Secur. Informatization 11, 108–110 (2017). (in Chinese)Google Scholar
  7. 7.
    Shen, Z.H.: Application of security baseline management in enterprises. Comput. Secur. 3, 19–21 (2013). (in Chinese)Google Scholar
  8. 8.
    Martin, R.A.: Making security measurable and manageable. In: IEEE Military Communications Conference, pp. 1–9 (2008)Google Scholar
  9. 9.
    Na, S., Kim, T., Kim, H.: A study on the classification of common vulnerabilities and exposures using Naïve Bayes. In: International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 657–662. Springer International Publishing, Heidelberg (2016)Google Scholar
  10. 10.
    Radack, S., Kuhn, R.: Managing security: the security content automation protocol. IEEE Educational Activities Department (2011)Google Scholar
  11. 11.
    Li, C., Wang, W.: Application of safety baseline control in risk management process. Netw. Secur. Technol. Appl. 9, 4–7 (2009). (in Chinese)Google Scholar
  12. 12.
    Waltermire, D., Quinn, S., Scarfone, K., Halbardier, A.: The technical specification for the security content automation protocol-SCAP: SCAP version 1.2 recommendations of the national institute of special publication 800–126 revision 2. Acta Obstetrica Et Gynaecologica Japonica 37(5), 608–609 (2012)Google Scholar
  13. 13.
    Shi, W., Zhang, L., Wu, C., Li, Z., Laue, F.C.M.: An online auction framework for dynamic resource provisioning in cloud computing. IEEE/ACM Trans. Netw. 24(4), 2060–2073 (2016)CrossRefGoogle Scholar
  14. 14.
    Zhang, Z., Feng, W., Yan, J.T.: A security configuration baseline verification system and method based on the cloud scanning system. Telecommun. Eng. Technol. Stand. 5(12), 20–23 (2012). (in Chinese)Google Scholar
  15. 15.
    Warrenl, W.J.B.M., Hutchinson, W.: A security evaluation criteria for baseline security standards. In: IFIP TC11 International Conference on Information Security: Visions and Perspectives, pp. 79–90. Kluwer (2002)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Yanzhou Chen
    • 1
    Email author
  • Qi Wang
    • 1
  • Meng Sun
    • 1
  • Peng Chen
    • 1
  • Zhizhong Qiao
    • 2
  • Zhangguo Chen
    • 2
  1. 1.CSG Power Dispatching Control CenterGuangzhouChina
  2. 2.NARI Information & Communication Technology Co., Ltd.NanjingChina

Personalised recommendations