网络安全态势认知融合感控模型
作者:
基金项目:

国家自然科学基金(90718003,61370212);教育部博士点基金(20122304130002);山东省高校科技计划(J11LG09)


Fusion-Based Cognitive Awareness-Control Model for Network Security Situation
Author:
Fund Project:

National Natural Science Foundation of China (90718003, 61370212); Ph.D. Programs Foundation of the Ministry of Education of China (20122304130002); Shandong Province Higher Educational Science and Technology Plan of China (J11LG09)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [44]
  • |
  • 相似文献
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    为了分析网络威胁的演化趋势,并探讨安全态势的自主感知和调控问题,将跨层结构和认知环融入模型的设计,提出一种基于融合的网络安全态势认知感控模型,增强网络安全系统的层间交互和认知能力.在分析模型组件及其功能的基础上,利用多源融合算法得到各异质传感器对网络安全事件的准确决策,结合对安全事件威胁等级和威胁因子关系的推演,克服威胁因子获取过程中需处理网络组件间复杂隶属关系的不足,从而提出包含服务级、主机级和网络级的层次化态势感知方法,提高对网络威胁的表达能力.而且通过对态势感知曲线的分析,搭建离散计算和连续控制之间的桥梁,形成闭环反馈控制结构,解决安全态势自感知和自调控的问题.仿真实验结果表明:基于融合的网络安全态势认知感控模型及方法能够融合异质安全数据,动态感知威胁的演化趋势,并具有一定的自主调控能力,达到了认知感控的研究目的,为监控和管理网络提供了新的方法和手段.

    Abstract:

    For the purpose of exploring the evolution trend and analyzing the autonomous awareness and control problems, this paper proposes a cognitive awareness-control model for network security situation based on fusion. This model is characterized by the design of the cross-layer architecture and cognitive circle which can improve the interactive and cognitive ability between the different network layers. Based on the analysis of the model components and their functions, this paper uses the fusion algorithm to obtain the accurate decision on the security events made by heterogeneous multi-sensor. Combining with the reasoning of the relation between threat gene and threat level, a hierarchical quantification method is put forward, encompassing service layer, host layer and network layer. This approach has the advantage of overcoming the shortcoming of dealing with the complex memberships among network components and improving the expression ability against network threat. In addition, through establishing the bridge between dispersed computing and the continuous control, the close-up feedback structure is formed and the self-awareness and self-control problems are solved. The simulation experiments prove that the presented model and algorithms can fuse heterogeneous security data, dynamically perceive the evolution trend of network threat and possess the autonomous regulation and control ability. This study meets the research goal of cognitive awareness-control and it provides a new method of monitoring and administrating the networks.

    参考文献
    [1] Bass T. Multi-Sensor data fusion for next generation distributed intrusion detection systems. In: Proc. of the IRIS National Symp. on Sensor and Data Fusion. 1999. 24-27.
    [2] Tadda G, Salerno JJ, Boulware D, Hinman M, Gorton S. Realizing situation awareness within a cyber environment. In: Proc. of the Multi-Sensor, Multi-Source Information Fusion: Architecture, Algorithms, and Applications, Vol.6242. 2006. 1-8. [doi: 10.1117/ 12.665763]
    [3] Shen D, Chen G, Cruz JB, Haynes JL, Kruger M, Blasch E. A Markov game theoretic approach for cyber situational awareness. In: Proc. of the Multi-Sensor, Multi-Source Information Fusion: Architectures, Algorithms, and Applications, Vol.6571. 2007. 1-11. [doi: 10.1117/12.720090]
    [4] Stephen L. The spinning cube of potential doom. Communications of the ACM, 2004,47(6):25-26. [doi: 10.1145/990680.990699]
    [5] Lakkaraju K, Yurcik W, Lee AJ. NVisionIP: NetFlow visualizations of system state for security situational awareness. In: Proc. of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. 2004. 65-72. [doi: 10.1145/1029208.1029219]
    [6] Shiravi H, Shiravi A, Ghorbani AA. A survey of visualization systems for network security. IEEE Trans. on Visualization and Computer Graphics, 2012,18(8):1313-1329. [doi: 10.1109/TVCG.2011.144]
    [7] Chen XZ, Zheng QH, Guan XH, Lin CG. Quantitative hierarchical threat evaluation model for network security. Ruan Jian Xue Bao/Journal of Software, 2006,17(4):885-897 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/17/885. htm [doi: 10.1360 /jos170885]
    [8] Hu W, Li J, Jiang X. A hierarchical algorithm for cyberspace situational awareness based on analytic hierarchy process. High Technology Letters, 2007,13(3):291-296.
    [9] Wei Y, Lian YF, Feng DG. A network security situational awareness model based on information fusion. Journal of Computer Research and Development, 2009,46(3):353-362 (in Chinese with English abstract).
    [10] Zhang Y, Huang SG, Guo SZ, Zhu JM. Multi-Sensor data fusion for cyber security situation awareness. Procedia Environmental Sciences, 2011,10:1029-1034. [doi: 10.1016/j.proenv.2011.09.165]
    [11] Dapoigny R, Barlatier P. Formal foundations for situation awareness based on dependent type theory. Information Fusion, 2013, 14(1):87-107. [doi: 10.1016/j.inffus.2012.02.006]
    [12] Gong ZH, Zhuo Y. Research on cyberspace situational awareness. Ruan Jian Xue Bao/Journal of Software, 2010,21(7):1605-1619 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3835.htm [doi: 10.3724/SP.J.1001.2010.03835]
    [13] Zhang Y, Tan XB, Cui XL, Xi HS. Network security situation awareness approach based on Markov game model. Ruan Jian Xue Bao/Journal of Software, 2011,22(3):495-508 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3751.htm [doi: 10.3724/SP.J.1001.2011.03751]
    [14] Thomas RW, Dasilva LA, MacKenzie AB. Cognitive networks: Adaptation and learning to achieve end-to-end performance objectives. IEEE Communication Magazine, 2006,44(12):51-57. [doi: 10.1109/MCOM.2006.273099]
    [15] Fortuna C, Mohorcic M. Trends in the development of communication networks: Cognitive networks. Computer Networks, 2009, 53(9):1354-1376. [doi: 10.1016/j.comnet.2009.01.002]
    [16] Clark DD, Partridge C, Ramming JC. A knowledge plane for the internet. In: Proc. of the 2003 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM). 2003. 3-10. [doi: 10.1145/863956. 863957]
    [17] Shakkottai S, Rappaport T, Karlsson P. Cross-Layer design for wireless networks. IEEE Communications Magazine, 2003,41(10): 74-80. [doi: 10.1109/MCOM.2003.1235598]
    [18] Aniba G, Aissa S. Cross-Layer designed adaptive modulation algorithm with packet combining and truncated ARQ over MIMO nakagami fading channels. IEEE Trans. on Wireless Communications, 2011,10(4):1026-1031. [doi: 10.1109/TWC.2011.030311. 100487]
    [19] Tran NH, Hong CS, Lee S. Cross-Layer design of congestion control and power control in fast-fading wireless networks. IEEE Trans. on Parallel and Distributed Systems, 2013,24(2):260-274. [doi: 10.1109/TPDS.2012.118]
    [20] Aguilar T, Syue SJ, Gauthier V, Afifi H. CoopGeo: A beaconless geographic cross-layer protocol for cooperative wireless ad hoc networks. IEEE Trans. on Wireless Communications, 2011,10(8):1-13. [doi: 10.1109/TWC.2011.060711.100480]
    [21] Gomez I, Marojevic V, Gelonch A. ALOE: An open-source SDR execution environment with cognitive computing resource management capabilities. IEEE Communications Magazine, 2011,49(9):76-83. [doi: 10.1109/MCOM.2011.6011737]
    [22] Gupta M. On fuzzy logic and cognitive computing: some perspectives. Scientia Iranica, 2011,18(3):590-592. [doi: 10.1016/j.scient. 2011.04.010]
    [23] Ogiela MR, You I. Cognitive and secure computing in information management. Int'l Journal of Information Management, 2013, 33(2):243-244. [doi: 10.1016/j.ijinfomgt.2012.11.009]
    [24] Wang M, Suda T. The bio-networking architecture. In: Proc. of the 2001 Symp. on Applications and the Internet. 2001. 43-53. [doi: 10.1109/SAINT.2001.905167]
    [25] Garlan D, Cheng S. Rainbow: Architecture-based self-adaptation with reusable infrastructure. IEEE Computer, 2004,37(10):46- 54. [doi: 10.1109/MC.2004.175]
    [26] Schmid S, Eggert L, Brunner, M, Quittek J. Towards autonomous network domains. In: Proc. of the 25th IEEE Int'l Conf. on Computer Communications (INFOCOM). 2006. 1-6. [doi: 10.1109/INFOCOM.2006.351]
    [27] Zhao WT, Yin JP, Long J. A cognition model of attack prediction in security situation awareness systems. Computer Engineering and Science, 2007,29(11):17-19 (in Chinese with English abstract).
    [28] Zang C, Huang ZD, Dong JX. State-Based generalized autonomic computing models. Journal of Computer-aided Design and Computer Graphics, 2007,19(11):1476-1481 (in Chinese with English abstract).
    [29] Feng GS, Wang HQ, Ma CG, Li BY, Zhao Q. Dynamic self-configuration of user QoS oriented to cognitive network. Journal on Communications, 2010,31(3):133-140 (in Chinese with English abstract).
    [30] Ma LR, Yang L, Wang JX. Research on security information fusion from multiple heterogeneous sensors. Journal of System Simulation, 2008,20(4):981-989 (in Chinese with English abstract).
    [31] Chen JJ. Multi-Sensor administration and information fusion [MS. Thesis]. Xian: Northwester Polytechnical University, 2002 (in Chinese with English abstract).
    [32] Zhao YX, Chen XD, Chen X. BFOA-Based optimal point selection for Lagrange interpolation. Journal of System Simulation, 2012, 24(10):2232-2235 (in Chinese with English abstract).
    [33] Liu XW, Wang HQ, Yu JG, Cao BX, Gao ZH. Network security situation awareness model based on multi-source fusion. Advanced Science Letters, 2012,5(2):775-779. [doi: 10.1166/asl.2012.1852]
    附中文参考文献:
    [7] 陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法.软件学报,2006,17(4):885-897. http://www.jos.org.cn/ 1000-9825/17/885.htm [doi: 10.1360/jos170885]
    [9] 韦勇,连一峰,冯登国.基于信息融合的网络安全态势评估模型.计算机研究与发展,2009,46(3):353-362.
    [12] 龚正虎,卓莹.网络态势感知研究.软件学报,2010,21(7):1605-1619. http://www.jos.org.cn/1000-9825/3835.htm [doi: 10. 3724/SP.J.1001.2010.03835]
    [13] 张勇,谭小彬,崔孝林,奚宏生.基于Markov博弈模型的网络安全态势感知方法.软件学报,2011,22(3):495-508. http://www.jos. org.cn/1000-9825/3751.htm [doi: 10.3724/SP. J.1001.2011.03751]
    [27] 赵文涛,殷建平,龙军.安全态势感知系统中攻击预测的认知模型.计算机工程与科学,2007,29(11):17-19.
    [28] 臧铖,黄忠东,董金祥.基于状态的通用自主计算模型.计算机辅助设计与图形学学报,2007,19(11):1476-1481.
    [29] 冯光升,王慧强,马春光,李冰洋,赵倩.面向认知网络的用户QoS动态自配置方法.通信学报,2010,31(3):133-140.
    [30] 马琳茹,杨林,王建新.多源异构安全信息融合关联技术研究系.系统仿真学报,2008,20(4):981-989.
    [31] 陈继军.多传感器管理及信息融合[硕士学位论文].西安:西北工业大学,2002.
    [32] 赵翼翔,陈新度,陈新.基于BFOA的拉格朗日插值点最优配置.系统仿真学报,2012,24(10):2232-2235.
    相似文献
    引证文献
引用本文

刘效武,王慧强,吕宏武,禹继国,张淑雯.网络安全态势认知融合感控模型.软件学报,2016,27(8):2099-2114

复制
相关视频

分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2013-09-22
  • 最后修改日期:2015-05-08
  • 在线发布日期: 2016-08-08
文章二维码
您是第19920828位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号