An Improved Assessment Method for the Network Security Risk

  • Jingjing HuEmail author
  • Shuangshuang Guo
  • Fankun Meng
  • Dongsheng Hu
  • Zhiyu Shi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11910)


Network security risk assessment is very important to improve the network security. The existing network security risk assessment method based on HMM is not enough to estimate the network risk, because some methods manually set model parameters or calculate the overall network risk only using the host node. Therefore, a network security risk assessment method based on improved Hidden Markov Model (I-HMM) is proposed. Firstly, the observation sequence acquisition of the model is optimized by calculating the quality of the sampling period alarm. Secondly, the model parameters are improved through the learning algorithm. Finally, the reliability and accuracy of the network security risk measurement are increased by introducing the network node correlation. The final results by the simulation experiment shows that the network security risk assessment method based on I-HMM has certain applicability, can accurately reflect the security risk status of the network, and can distinguish the influence degree of different hosts on network risk.


Assessment model Risk Network security Hidden Markov Model 


  1. 1.
    Guang, K., Guangming, T., Xia, D.: A network security situation assessment method based on attack intention perception. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE (2016)Google Scholar
  2. 2.
    Kun, W., Hui, Q., Haopu, Y.: Network security situation evaluation method based on attack intention recognition. In: International Conference on Computer Science & Network Technology. IEEE (2016)Google Scholar
  3. 3.
    Samy, G.N., Shanmugam, B., Maarop, N.: Information security risk assessment framework for cloud computing environment using medical research design and method. Adv. Sci. Lett. 24(1), 739–743 (2018)CrossRefGoogle Scholar
  4. 4.
    Li, S., Bi, F., Chen, W.: An improved information security risk assessments method for cyber-physical-social computing and networking. IEEE Access 6, 10311–10319 (2018)CrossRefGoogle Scholar
  5. 5.
    Li, X., Zhao, H.: Network security situation assessment based on HMM-MPGA. In: International Conference on Information Management, pp. 57–63. IEEE (2016)Google Scholar
  6. 6.
    Hamid, T., Al-Jumeily, D., Hussain, A.: Cyber security risk evaluation research based on entropy weight method. In: 2016 9th International Conference on Developments in eSystems Engineering (DeSE). IEEE (2016)Google Scholar
  7. 7.
    Huang, K., Zhou, C., Tian, Y.C.: Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks. In: 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–6 (2017)Google Scholar
  8. 8.
    Liu, S., Liu, Y.: Network security risk assessment method based on HMM and attack graph model. IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 517–522. IEEE (2016)Google Scholar
  9. 9.
    Xi, R.-R., Yun, X.-C., Zhang, Y.-Z.: An improved quantitative evaluation method for network security. Chin. J. Comput. 38(4), 749–758 (2015)MathSciNetGoogle Scholar
  10. 10.
    Pietras, M., Klęsk, P.: FPGA implementation of logarithmic versions of Baum-Welch and Viterbi algorithms for reduced precision hidden Markov models. Bull. Pol. Acad. Sci. Tech. Sci. 65(6), 935–947 (2017)Google Scholar
  11. 11.
    Wang, Z., Lu, Y., Li, J.: Network security risk assessment based on node correlation. J. Phys.: Conf. Ser. 1069(1), 012073 (2018)Google Scholar
  12. 12.
    Li, Y., Liu, S., Yu, Y.: Analysis of network vulnerability under joint node and link attacks. Mater. Sci. Eng. Conf. Ser. 322(5), 052052 (2018)CrossRefGoogle Scholar
  13. 13.
    Wangen, G.: Information security risk assessment: a method comparison. Computer 50(4), 52–61 (2017)CrossRefGoogle Scholar
  14. 14.
    Doynikova, E., Kotenko, I.: CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection. In: Euromicro International Conference on Parallel, Distributed and Network-Based Processing, pp. 346–353. IEEE (2017)Google Scholar
  15. 15.
    Coffey, K., Smith, R., Maglaras, L.: Vulnerability analysis of network scanning on SCADA systems. Secur. Commun. Netw. 2018(4), 1–21 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Jingjing Hu
    • 1
    Email author
  • Shuangshuang Guo
    • 1
  • Fankun Meng
    • 1
  • Dongsheng Hu
    • 1
  • Zhiyu Shi
    • 1
  1. 1.School of ComputerBeijing Institute of TechnologyBeijingChina

Personalised recommendations