Application Analysis of Network Security Situational Awareness Model for Asset Information Protection

被引:0
|
作者
Ren, Yuemei [1 ]
Feng, Xianju [1 ]
机构
[1] Henan Polytech Inst, Nanyang, Peoples R China
关键词
Asset information protection; cyber security; situational awareness; knowledge graph; attack scenarios;
D O I
10.14569/IJACSA.2024.0150579
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The popularity of the Internet makes the network develop rapidly. However, the network security threat is more complex and hidden. The traditional network security alarm system has the problems of low accuracy and low efficiency when dealing with huge redundant data. Therefore, the research comprehensively considers the network security problems, proposes a network security situational awareness model for asset information protection combined with knowledge graph, establishes an asset-based network security knowledge graph, utilizes attribute graphs to complete the network attack scenario discovery and network situational understanding, and verifies the effectiveness and superiority of the model. The experimental results show that the research-proposed model detects an average of 9706 attacks out of 10000 attacks. For 100 high-risk level attacks, the number of detections is higher than 98. The average correctness, recall, and false alarm rates of the research proposed model are 99.48%, 99.04%, and 0.86%, respectively. In addition, when the model is running, its maximum memory usage is only 22.67%, and the time to complete the attack detection at the same time is 258.4s, both of which are much lower than the comparison algorithms. Finally, the research-proposed model is able to effectively reflect the impact of attack events on the posture of asset nodes. The proposed cybersecurity situational awareness model is of great theoretical and practical significance for improving organizational cybersecurity, innovating cybersecurity solutions, and maintaining the security of asset information in the digital era.
引用
收藏
页码:790 / 799
页数:10
相关论文
共 50 条
  • [21] Functional Requirements of Situational Awareness in Computer Network Security
    Onwubiko, Cyril
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 209 - 213
  • [22] A usable security paradigm for information asset protection
    Ronchi, C
    Zakhidov, S
    ISSE 2005 - Securing Electronic Business Processes, 2005, : 432 - 439
  • [23] Selection and Fusion of Indicators for Network Security Situational Awareness
    Fu Yanming
    Chen Pan
    Zhong Mi
    Chen Wen
    MATERIALS SCIENCE AND ENGINEERING, PTS 1-2, 2011, 179-180 : 613 - +
  • [24] Enhancing situational awareness on fragmented information in complex systems with workflow information network analysis
    Metso L.
    Marttonen-Arola S.
    Linnimaa S.
    Kinnunen S.-K.
    Kärri T.
    International Journal of Industrial and Systems Engineering, 2020, 36 (04) : 577 - 590
  • [25] Situational awareness and network traffic analysis
    McHugh, J
    Gates, C
    Becknel, D
    Cyberspace Security and Defense: Research Issues, 2005, 196 : 209 - 228
  • [26] Quantification of network security situational awareness based on evolutionary neural network
    Liang, Ying
    Wang, Hui-Qiang
    Lai, Ji-Bao
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3267 - 3272
  • [27] The Analysis of University Network Information Security System Based on Level Protection Model
    Xian Weiquan
    Wang Houkui
    He Haoyi
    Zheng Donghong
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 609 - 614
  • [28] The Information System Security Situational Awareness Based On Cloud Computing
    Ma Zhicheng
    Jin Lin
    Yang Peng
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 583 - 586
  • [29] Computer Network Defence Situational Awareness information requirements
    Beaudoin, Luc
    Froh, Michael
    Gregoire, Marc
    Lefebvre, Julie
    MILCOM 2006, VOLS 1-7, 2006, : 3061 - +
  • [30] Analysis of computer network information security and protection strategy
    Yu, Wenye
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY (ICEMCT-16), 2016, 59 : 1239 - 1242