Research on Real-Time Network Security Risk Assessment and Forecast

Modern security problems focus on sensibly allocating resources to decrease the magnitude of potential hazards, decrease the chances of adversary success given an attempt, or minimize loss following a successful attack. However, current risk assessment methodologies focus on manual risk analysis of network during design or through periodic reviews. Techniques for real-time risk assessment are scarce. In this paper, we propose a novel real-time risk assessment method using fuzzy logic and Petri Nets. The proposed method enables decision analysts to better understand the complete evaluation process of network security risk assessment, Furthermore, this approach can predict the potential network risk and provide credible confidence scores of risk assessment. The experimental results show that the proposed method is very useful in network security risk assessment.

[1]  Christopher J. Alberts,et al.  Managing Information Security Risks: The OCTAVE Approach , 2002 .

[2]  Svein J. Knapskog,et al.  Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems , 2005, CIS.

[3]  C. E. Bonafede,et al.  Bayesian networks for enterprise risk assessment , 2006, physics/0607226.

[4]  Jian-Bo Yang,et al.  Risk evaluation in failure mode and effects analysis using fuzzy weighted geometric mean , 2009, Expert Syst. Appl..

[5]  Wang Huiqiang,et al.  Study of Network Security Situation Awareness Model Based on Simple Additive Weight and Grey Theory , 2006, 2006 International Conference on Computational Intelligence and Security.

[6]  Yong Chen,et al.  Research on Risk Probability Estimating Using Fuzzy Clustering for Dynamic Security Assessment , 2005, RSFDGrC.

[7]  Tharam S. Dillon,et al.  Fuzzy trust evaluation and credibility development in multi-agent systems , 2007, Appl. Soft Comput..

[8]  Deborah A. Frincke,et al.  Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net , 2007, Comput. Networks.

[9]  Tansel Özyer,et al.  Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening , 2007, J. Netw. Comput. Appl..

[10]  Bin-Xing Fang,et al.  A risk assessment approach for network information system , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).

[11]  R.F. Mills,et al.  Analyzing Attack Trees using Generalized Stochastic Petri Nets , 2006, 2006 IEEE Information Assurance Workshop.

[12]  Bilal M. Ayyub,et al.  Multicriteria Security System Performance Assessment Using Fuzzy Logic , 2007 .

[13]  Warren D. Seider,et al.  Real-time risk analysis of safety systems , 2008, Comput. Chem. Eng..