Abstract
Network security risk assessment is very important to improve the network security. The existing network security risk assessment method based on HMM is not enough to estimate the network risk, because some methods manually set model parameters or calculate the overall network risk only using the host node. Therefore, a network security risk assessment method based on improved Hidden Markov Model (I-HMM) is proposed. Firstly, the observation sequence acquisition of the model is optimized by calculating the quality of the sampling period alarm. Secondly, the model parameters are improved through the learning algorithm. Finally, the reliability and accuracy of the network security risk measurement are increased by introducing the network node correlation. The final results by the simulation experiment shows that the network security risk assessment method based on I-HMM has certain applicability, can accurately reflect the security risk status of the network, and can distinguish the influence degree of different hosts on network risk.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Guang, K., Guangming, T., Xia, D.: A network security situation assessment method based on attack intention perception. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE (2016)
Kun, W., Hui, Q., Haopu, Y.: Network security situation evaluation method based on attack intention recognition. In: International Conference on Computer Science & Network Technology. IEEE (2016)
Samy, G.N., Shanmugam, B., Maarop, N.: Information security risk assessment framework for cloud computing environment using medical research design and method. Adv. Sci. Lett. 24(1), 739–743 (2018)
Li, S., Bi, F., Chen, W.: An improved information security risk assessments method for cyber-physical-social computing and networking. IEEE Access 6, 10311–10319 (2018)
Li, X., Zhao, H.: Network security situation assessment based on HMM-MPGA. In: International Conference on Information Management, pp. 57–63. IEEE (2016)
Hamid, T., Al-Jumeily, D., Hussain, A.: Cyber security risk evaluation research based on entropy weight method. In: 2016 9th International Conference on Developments in eSystems Engineering (DeSE). IEEE (2016)
Huang, K., Zhou, C., Tian, Y.C.: Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks. In: 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–6 (2017)
Liu, S., Liu, Y.: Network security risk assessment method based on HMM and attack graph model. IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 517–522. IEEE (2016)
Xi, R.-R., Yun, X.-C., Zhang, Y.-Z.: An improved quantitative evaluation method for network security. Chin. J. Comput. 38(4), 749–758 (2015)
Pietras, M., Klęsk, P.: FPGA implementation of logarithmic versions of Baum-Welch and Viterbi algorithms for reduced precision hidden Markov models. Bull. Pol. Acad. Sci. Tech. Sci. 65(6), 935–947 (2017)
Wang, Z., Lu, Y., Li, J.: Network security risk assessment based on node correlation. J. Phys.: Conf. Ser. 1069(1), 012073 (2018)
Li, Y., Liu, S., Yu, Y.: Analysis of network vulnerability under joint node and link attacks. Mater. Sci. Eng. Conf. Ser. 322(5), 052052 (2018)
Wangen, G.: Information security risk assessment: a method comparison. Computer 50(4), 52–61 (2017)
Doynikova, E., Kotenko, I.: CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection. In: Euromicro International Conference on Parallel, Distributed and Network-Based Processing, pp. 346–353. IEEE (2017)
Coffey, K., Smith, R., Maglaras, L.: Vulnerability analysis of network scanning on SCADA systems. Secur. Commun. Netw. 2018(4), 1–21 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Hu, J., Guo, S., Meng, F., Hu, D., Shi, Z. (2019). An Improved Assessment Method for the Network Security Risk. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2019. Lecture Notes in Computer Science(), vol 11910. Springer, Cham. https://doi.org/10.1007/978-3-030-34139-8_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-34139-8_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34138-1
Online ISBN: 978-3-030-34139-8
eBook Packages: Computer ScienceComputer Science (R0)