I-HMM-Based Multidimensional Network Security Risk Assessment

Cyber-physical systems (CPS) are vulnerable to network attacks because communication relies on the network that links the various components in the CPS. The importance of network security is self-evident. In this study, we conduct a network security risk assessment from the perspectives of the host and the network, and we propose a new framework for a multidimensional network security risk assessment that includes two stages, i.e., risk identification and risk calculation. For the risk identification stage, we propose a multidimensional hierarchical index system for assessing cybersecurity risk; the system’s security status is determined in three dimensions, i.e., basic operation, vulnerabilities, and threats, and these dimensions guide the data collection. In the risk calculation stage, we use a hidden Markov model (HMM) to assess the network security risk. We provide a new definition of the quality of alert and optimize the observation sequence of the HMM. The model uses a learning algorithm instead of setting the parameters manually. We introduce the concept of network node association to increase the reliability and accuracy of the risk assessment. The simulation results show that the proposed index system provides quantitative data that reflect the security status of the network. The proposed network security risk assessment method based on the improved HMM (I-HMM) reflects the security risk status in a timely and intuitive manner and detects the degree of risk that different hosts pose to the network.

[1]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[2]  Igor V. Kotenko,et al.  CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection , 2017, 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP).

[3]  Yu Zhang,et al.  A payload-dependent packet rearranging covert channel for mobile VoIP traffic , 2018, Inf. Sci..

[4]  Yu Zhang,et al.  Research on QoS service composition based on coevolutionary genetic algorithm , 2018, Soft Comput..

[5]  Liehuang Zhu,et al.  A packet-reordering covert channel over VoLTE voice and video traffics , 2019, J. Netw. Comput. Appl..

[6]  Chunjie Zhou,et al.  Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).

[7]  Yuanzhang Li,et al.  A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images , 2019, IEEE Access.

[8]  Longfei Wu,et al.  EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.

[9]  Yong Gan,et al.  A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application , 2018, IEEE Access.

[10]  Chen Liang,et al.  A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..

[11]  Chen Liang,et al.  Building covert timing channels by packet rearrangement over mobile networks , 2018, Inf. Sci..

[12]  Gaute Wangen,et al.  Information Security Risk Assessment: A Method Comparison , 2017, Computer.

[13]  Leandros A. Maglaras,et al.  Vulnerability Analysis of Network Scanning on SCADA Systems , 2018, Secur. Commun. Networks.

[14]  Lu Liu,et al.  A hierarchical group key agreement protocol using orientable attributes for cloud computing , 2019, Inf. Sci..

[15]  Yong Gan,et al.  Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication , 2019, IEEE Access.

[16]  Hou Di,et al.  Network security situation evaluation method based on attack intention recognition , 2015, 2015 4th International Conference on Computer Science and Network Technology (ICCSNT).

[17]  Przemysław Klęsk,et al.  FPGA implementation of logarithmic versions of Baum-Welch and Viterbi algorithms for reduced precision hidden Markov models , 2017 .

[18]  Changzhen Hu,et al.  Establishing a software defect prediction model via effective dimension reduction , 2019, Inf. Sci..

[19]  Yuan Liu,et al.  Network security risk assessment method based on HMM and attack graph model , 2016, 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[20]  Xiaoyan Li,et al.  Network security situation assessment based on HMM-MPGA , 2016, 2016 2nd International Conference on Information Management (ICIM).

[21]  Xiaojiang Du,et al.  Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.

[22]  Chen Liang,et al.  A sensitive network jitter measurement for covert timing channels over interactive traffic , 2018, Multimedia Tools and Applications.

[23]  Wei Chen,et al.  An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking , 2018, IEEE Access.

[24]  Tang Guangming,et al.  A network security situation assessment method based on attack intention perception , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[25]  T. Hamid,et al.  Cyber Security Risk Evaluation Research Based on Entropy Weight Method , 2016, 2016 9th International Conference on Developments in eSystems Engineering (DeSE).

[26]  Xiangliang Zhang,et al.  Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers , 2018, Future Gener. Comput. Syst..

[27]  Xiaohui Kuang,et al.  Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation , 2019, Applied Sciences.

[28]  Xianmin Wang,et al.  Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..

[29]  Ganthan Narayana Samy,et al.  Information Security Risk Assessment Framework for Cloud Computing Environment Using Medical Research Design and Method , 2018 .

[30]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[31]  Jin Li,et al.  The security of machine learning in an adversarial setting: A survey , 2019, J. Parallel Distributed Comput..

[32]  Jindong Li,et al.  Network Security Risk Assessment Based on Node Correlation , 2018 .

[33]  Lu Liu,et al.  An authenticated asymmetric group key agreement based on attribute encryption , 2018, J. Netw. Comput. Appl..

[34]  Chen Liang,et al.  RootAgency: A digital signature-based root privilege management agency for cloud terminal devices , 2018, Inf. Sci..

[35]  Giovanni Vigna,et al.  Using Hidden Markov Models to Evaluate the Risks of Intrusions , 2006, RAID.

[36]  Yongcheng Li,et al.  Analysis of Network Vulnerability Under Joint Node and Link Attacks , 2018 .

[37]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..