IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET14119                                                     


Performance Evaluation of Composite Network Security Situation Assessment Using HRCAL Approach

Authors(2):

Ms. Ankita Patil, Mr. Vijay Prakash
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Internet attacks area unit on the increase and create serious security threats to enterprise networks, industrial websites and to the lots of home web users. Web attacks have become less assailable and complicated with time. Network traffic visualization tools have with successfully enabled security analysts to know the character of traffic gift in a very network. Conversely, these tools believe principally on human experience to get anomalies in traffic and attack patterns. Human capability to grasp large amounts of time-varying data is proscribed and network visualization tools want additional visual aid to extract attention-grabbing patters from such massive and complicated knowledge sets [1]. By visualizing a group of straightforward graph patterns, analysts will place along visual items of knowledge sent by these smaller patterns and might find out about larger and a lot of complicated patterns.Powerful and versatile specification will work on the limitation of un-uniform pattern specification formats existing within the current tools. Therefore, our approach gives way to an iterative visual investigation and allows fast discovery of a lot of subtle attack patterns and abnormal options that area unit otherwise undetectable by normal network traffic visualization tools

Ms. Ankita Patil, Mr. Vijay Prakash

HRCAL (Host, Route, Configuration and Attack Level Analysis), Visualization, Forecasting, makeover.

'

 [1] Rongrong Xi, Shuyuan Jin, Xiaochun Yun and  Yongzheng Zhang, “CNSSA: A Comprehensive  Network Security Situation Awareness System”,  in International Joint Conference of IEEE TrustCom, ISSN: 978-0-7695-4600-1/11, doi: 10.1109/TrustCom.2011.62, 2011. 

[2] Endsley, M. , "Toward a theory of situation awareness in dynamic systems, " Human Factors, Vol. 37, No. 1, pp. 32-64, 2005.

[3] Lai Jibao, Wang Huiqiang, and Zhu Liang, "Study of Network Security Situation Awareness Model Based on Simple Additive Weight and Grey Theory," 2006.

[4] Liu Mixi, Yu Dongmei and Zhang Qiuyu et aI. , "Network Security Situation Assessment Based on Data Fusion, " 2008 Workshop on Knowledge Discovery and Data Mining, 2008.

[5] Yu Dong and Frincke, D. , "Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster-Shafer Theory, " 43rd ACM Southeast Conference, March 18-20, 2005.

[6] Wang Huiqiang, Lai Jibao, and Ying Liang, "Network Security Situation Awareness Based on Heterogeneous Multi-Sensor Data Fusion and Neural Network, " Second International Multisymposium on Computer and Computational Sciences, 2007.

[7] Stefanos Manganaris, Marvin Christensen, Dan Zerkle, et al. A data mining analysis of RTID alarms. Computer Networks, 2000, 34(4):571-577

[8] Bass, T. and Robichaux, R. , "Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations," Proceedings of IEEE Military Communications Conference, vol. 1, pp. 64-70, 200 I.

[9] Zhang Yong, Tan Xiaobin and Xi Hongsheng, "A Novel Approach to Network Security Situation Awareness Based on MUlti-perspective Analysis, " IEEE 2007 International Conference on Computational Intelligence and Security, 2007.

[10] Chen XZ, Zheng QH and Guan XH et aI. , "Quantitative hierarchical threat evaluation model for network security, " Journal of Software, Vol. 17 , No. 4, pp. 885-897, April 2006, http://www. jos. org. cn/lOOO- 9825/17/885. htm, Accessed on Jun 2008.

[11] J Hall, J Pei, Y Yin. Mining frequent patterns without candidate generation. 2000 ACM. SIGMOD int'I Conf on Management of Data (SIGMOD'OO), DallaS, TX, 2000

[12] Mika Klemettinen. A knowledge discovery methodology for telecommunication network alarm databases. [Ph 0 dissertation]. Helsinki: University of Helsinki, Finland, 1999

[13] Haines JW, Lippmann RP, Fried OJ, Tran E, Boswell S, Zissman MA. DARPA intrusion detection system evaluation: Design and procedures. Technical Report 1062, Lexington: MIT Lincoln Laboratory, 1999.

[14] Lang F, Wang C, Gouqing M. " A Framework for network security situation awareness based on knowledge discovery" 2010 2nd International conference on computer Engineering and Technology.

[15] Ankita Patil, Vijay Prakash “A Novel Framework for Composite Network Security Situation Assessment Using HRCAL Approach”2013 international journals of Engineering  Science Research and Technology.


'

Publication Details

Published in : Volume 1 | Issue 1 | January-Febuary - 2015
Date of Publication Print ISSN Online ISSN
2015-02-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
8-15 IJSRSET14119   Technoscience Academy

Cite This Article

Ms. Ankita Patil, Mr. Vijay Prakash, "Performance Evaluation of Composite Network Security Situation Assessment Using HRCAL Approach", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 1, pp.8-15, January-Febuary-2015.
URL : http://ijsrset.com/IJSRSET14119.php

Thomson Reuters

Search Your Article

Enter ID [Ex. IJSRSET14XXX]

Impact Factor

Adds