2020
DOI: 10.1109/access.2019.2961997
|View full text |Cite
|
Sign up to set email alerts
|

I-HMM-Based Multidimensional Network Security Risk Assessment

Abstract: Cyber-physical systems (CPS) are vulnerable to network attacks because communication relies on the network that links the various components in the CPS. The importance of network security is selfevident. In this study, we conduct a network security risk assessment from the perspectives of the host and the network, and we propose a new framework for a multidimensional network security risk assessment that includes two stages, i.e., risk identification and risk calculation. For the risk identification stage, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 38 publications
(33 reference statements)
0
7
0
Order By: Relevance
“…Hu et al [ 68 ] propose a network security risk assessment method that is based on the Improved Hidden Markov Model (I-HMM). The proposed model reflects the security risk status in a timely and intuitive manner, and it detects the degree of risk that different hosts pose to the network.…”
Section: Related Workmentioning
confidence: 99%
“…Hu et al [ 68 ] propose a network security risk assessment method that is based on the Improved Hidden Markov Model (I-HMM). The proposed model reflects the security risk status in a timely and intuitive manner, and it detects the degree of risk that different hosts pose to the network.…”
Section: Related Workmentioning
confidence: 99%
“…Network security situation prediction means predicting the future network situation according to the current network state and historical data. In recent years, the rapid development of machine learning provides a new solution for network situation prediction, such as the support vector machine (SVM) [ 12 ] and hidden Markov model (HMM) [ 13 ]. Then, deep learning applies to network security situation assessment: for example, [ 14 ] summarizes the artificial intelligence related to network security as well as the progress and challenges of current research; [ 15 ] studies the performance of different neural networks in the NSSP; and [ 16 ] proposes an LSTM network security situation prediction model based on the sigmoid weighted reinforcement mechanism, which can improve the convergence rate.…”
Section: Related Workmentioning
confidence: 99%
“…In the training process of the dataset, the loss function is used to measure the difference between the estimated value and the observed value of the model. The formula is as follows: loss : L(ŷ, y) = ω(θ)(ŷ − y) 2 (13) where ω(Θ) is the weight of the real value, y is the real value, andŷ is the output of the model. Figure 5 shows the image of the loss function when training the dataset after applying the LSTM model.…”
Section: Network Attack Probability Analysismentioning
confidence: 99%
“…Risk assessment plays an important role in understanding and evaluating risks [14] to ensure cybersecurity and to calculate impacts caused by undesired events [15]. Therefore, risk assessment for cybersecurity comprises identifying threats, vulnerabilities, and property assets available within the attack targets [58] and is intended to minimize the negative impacts of potential threats. As the demands for cybersecurity increase to secure data, peripherals, and systems, the need for risk assessment on cybersecurity, especially those implemented at critical infrastructures, including nuclear facilities, also increases.…”
Section: A Cybersecurity Risk Assessment In Nuclear Facilitiesmentioning
confidence: 99%