2018
DOI: 10.1155/2018/5787102
|View full text |Cite
|
Sign up to set email alerts
|

Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis

Abstract: Network security metrics allow quantitatively evaluating the overall resilience of networked systems against attacks. From this aim, security metrics are of great importance to the security-related decision-making process of enterprises. In this paper, we employ absorbing Markov chain (AMC) to estimate the network security combining with the technique of big data correlation analysis. Specifically, we construct the model of AMC using a large amount of alert data to describe the scenario of multistep attacks in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…They then converted the potential threats to a certain level of risk to measure the overall security. Hu et al [52] employed an absorbing Markov chain (AMC) to estimate the network security in combination with the big data correlation analysis technique. Wu et al [53] proposed a security situational awareness mechanism based on the analysis of big data in the smart grid.…”
Section: B Efficient Policy Selectionmentioning
confidence: 99%
“…They then converted the potential threats to a certain level of risk to measure the overall security. Hu et al [52] employed an absorbing Markov chain (AMC) to estimate the network security in combination with the big data correlation analysis technique. Wu et al [53] proposed a security situational awareness mechanism based on the analysis of big data in the smart grid.…”
Section: B Efficient Policy Selectionmentioning
confidence: 99%
“…Network state and attack-defense action are important components of stochastic game model. Extraction of network state and attack-defense action is a key point in constructing attack-defense stochastic game model [21]. In the current attack-defense stochastic game, when describing the network state, each network state contains the security elements of all nodes in the current network.…”
Section: Network State and Attack-defense Action Extractionmentioning
confidence: 99%
“…e purpose of the attack graph [1][2][3][4][5] is to analyze the attack-defense actions of the network through nodes and edges in the graph. Attribute attack graph regards the condition or attribute of the network as a node in the attack graph.…”
Section: Introductionmentioning
confidence: 99%
“…Steps (1)-(4) are repeated until the attack-defense reaches a balance state at time t + k e network state transition during the attack process is shown inFigure 1(b).…”
mentioning
confidence: 99%