{"title":"一种新的网络风险评估模型","authors":"Zhicai Shi","doi":"10.1109/FSKD.2012.6233737","DOIUrl":null,"url":null,"abstract":"In order to assess the secure states of network systems hidden Markov stochastic process is used as the decision and analysis tool. Alarm events from intrusion detection systems are used as the processed objects. A novel hidden Markov Model is proposed and it is used to describe the state transform procedure of attacked hosts. The calculation method of the risk exponent for hosts is given. The risk exponent of each host is added together to give the quantitative evaluation of the risk for entire network systems. The experiments have justified that the proposed method is effective.","PeriodicalId":337941,"journal":{"name":"International Conference on Fuzzy Systems and Knowledge Discovery","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A novel model for assessing network risks\",\"authors\":\"Zhicai Shi\",\"doi\":\"10.1109/FSKD.2012.6233737\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to assess the secure states of network systems hidden Markov stochastic process is used as the decision and analysis tool. Alarm events from intrusion detection systems are used as the processed objects. A novel hidden Markov Model is proposed and it is used to describe the state transform procedure of attacked hosts. The calculation method of the risk exponent for hosts is given. The risk exponent of each host is added together to give the quantitative evaluation of the risk for entire network systems. The experiments have justified that the proposed method is effective.\",\"PeriodicalId\":337941,\"journal\":{\"name\":\"International Conference on Fuzzy Systems and Knowledge Discovery\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-05-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Fuzzy Systems and Knowledge Discovery\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FSKD.2012.6233737\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Fuzzy Systems and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FSKD.2012.6233737","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In order to assess the secure states of network systems hidden Markov stochastic process is used as the decision and analysis tool. Alarm events from intrusion detection systems are used as the processed objects. A novel hidden Markov Model is proposed and it is used to describe the state transform procedure of attacked hosts. The calculation method of the risk exponent for hosts is given. The risk exponent of each host is added together to give the quantitative evaluation of the risk for entire network systems. The experiments have justified that the proposed method is effective.