Fusion-Based Cognitive Awareness-Control Model for Network Security Situation
Author:
Affiliation:

Fund Project:

National Natural Science Foundation of China (90718003, 61370212); Ph.D. Programs Foundation of the Ministry of Education of China (20122304130002); Shandong Province Higher Educational Science and Technology Plan of China (J11LG09)

  • Article
  • | |
  • Metrics
  • |
  • Reference [44]
  • |
  • Related [20]
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    For the purpose of exploring the evolution trend and analyzing the autonomous awareness and control problems, this paper proposes a cognitive awareness-control model for network security situation based on fusion. This model is characterized by the design of the cross-layer architecture and cognitive circle which can improve the interactive and cognitive ability between the different network layers. Based on the analysis of the model components and their functions, this paper uses the fusion algorithm to obtain the accurate decision on the security events made by heterogeneous multi-sensor. Combining with the reasoning of the relation between threat gene and threat level, a hierarchical quantification method is put forward, encompassing service layer, host layer and network layer. This approach has the advantage of overcoming the shortcoming of dealing with the complex memberships among network components and improving the expression ability against network threat. In addition, through establishing the bridge between dispersed computing and the continuous control, the close-up feedback structure is formed and the self-awareness and self-control problems are solved. The simulation experiments prove that the presented model and algorithms can fuse heterogeneous security data, dynamically perceive the evolution trend of network threat and possess the autonomous regulation and control ability. This study meets the research goal of cognitive awareness-control and it provides a new method of monitoring and administrating the networks.

    Reference
    [1] Bass T. Multi-Sensor data fusion for next generation distributed intrusion detection systems. In: Proc. of the IRIS National Symp. on Sensor and Data Fusion. 1999. 24-27.
    [2] Tadda G, Salerno JJ, Boulware D, Hinman M, Gorton S. Realizing situation awareness within a cyber environment. In: Proc. of the Multi-Sensor, Multi-Source Information Fusion: Architecture, Algorithms, and Applications, Vol.6242. 2006. 1-8. [doi: 10.1117/ 12.665763]
    [3] Shen D, Chen G, Cruz JB, Haynes JL, Kruger M, Blasch E. A Markov game theoretic approach for cyber situational awareness. In: Proc. of the Multi-Sensor, Multi-Source Information Fusion: Architectures, Algorithms, and Applications, Vol.6571. 2007. 1-11. [doi: 10.1117/12.720090]
    [4] Stephen L. The spinning cube of potential doom. Communications of the ACM, 2004,47(6):25-26. [doi: 10.1145/990680.990699]
    [5] Lakkaraju K, Yurcik W, Lee AJ. NVisionIP: NetFlow visualizations of system state for security situational awareness. In: Proc. of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. 2004. 65-72. [doi: 10.1145/1029208.1029219]
    [6] Shiravi H, Shiravi A, Ghorbani AA. A survey of visualization systems for network security. IEEE Trans. on Visualization and Computer Graphics, 2012,18(8):1313-1329. [doi: 10.1109/TVCG.2011.144]
    [7] Chen XZ, Zheng QH, Guan XH, Lin CG. Quantitative hierarchical threat evaluation model for network security. Ruan Jian Xue Bao/Journal of Software, 2006,17(4):885-897 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/17/885. htm [doi: 10.1360 /jos170885]
    [8] Hu W, Li J, Jiang X. A hierarchical algorithm for cyberspace situational awareness based on analytic hierarchy process. High Technology Letters, 2007,13(3):291-296.
    [9] Wei Y, Lian YF, Feng DG. A network security situational awareness model based on information fusion. Journal of Computer Research and Development, 2009,46(3):353-362 (in Chinese with English abstract).
    [10] Zhang Y, Huang SG, Guo SZ, Zhu JM. Multi-Sensor data fusion for cyber security situation awareness. Procedia Environmental Sciences, 2011,10:1029-1034. [doi: 10.1016/j.proenv.2011.09.165]
    [11] Dapoigny R, Barlatier P. Formal foundations for situation awareness based on dependent type theory. Information Fusion, 2013, 14(1):87-107. [doi: 10.1016/j.inffus.2012.02.006]
    [12] Gong ZH, Zhuo Y. Research on cyberspace situational awareness. Ruan Jian Xue Bao/Journal of Software, 2010,21(7):1605-1619 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3835.htm [doi: 10.3724/SP.J.1001.2010.03835]
    [13] Zhang Y, Tan XB, Cui XL, Xi HS. Network security situation awareness approach based on Markov game model. Ruan Jian Xue Bao/Journal of Software, 2011,22(3):495-508 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3751.htm [doi: 10.3724/SP.J.1001.2011.03751]
    [14] Thomas RW, Dasilva LA, MacKenzie AB. Cognitive networks: Adaptation and learning to achieve end-to-end performance objectives. IEEE Communication Magazine, 2006,44(12):51-57. [doi: 10.1109/MCOM.2006.273099]
    [15] Fortuna C, Mohorcic M. Trends in the development of communication networks: Cognitive networks. Computer Networks, 2009, 53(9):1354-1376. [doi: 10.1016/j.comnet.2009.01.002]
    [16] Clark DD, Partridge C, Ramming JC. A knowledge plane for the internet. In: Proc. of the 2003 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM). 2003. 3-10. [doi: 10.1145/863956. 863957]
    [17] Shakkottai S, Rappaport T, Karlsson P. Cross-Layer design for wireless networks. IEEE Communications Magazine, 2003,41(10): 74-80. [doi: 10.1109/MCOM.2003.1235598]
    [18] Aniba G, Aissa S. Cross-Layer designed adaptive modulation algorithm with packet combining and truncated ARQ over MIMO nakagami fading channels. IEEE Trans. on Wireless Communications, 2011,10(4):1026-1031. [doi: 10.1109/TWC.2011.030311. 100487]
    [19] Tran NH, Hong CS, Lee S. Cross-Layer design of congestion control and power control in fast-fading wireless networks. IEEE Trans. on Parallel and Distributed Systems, 2013,24(2):260-274. [doi: 10.1109/TPDS.2012.118]
    [20] Aguilar T, Syue SJ, Gauthier V, Afifi H. CoopGeo: A beaconless geographic cross-layer protocol for cooperative wireless ad hoc networks. IEEE Trans. on Wireless Communications, 2011,10(8):1-13. [doi: 10.1109/TWC.2011.060711.100480]
    [21] Gomez I, Marojevic V, Gelonch A. ALOE: An open-source SDR execution environment with cognitive computing resource management capabilities. IEEE Communications Magazine, 2011,49(9):76-83. [doi: 10.1109/MCOM.2011.6011737]
    [22] Gupta M. On fuzzy logic and cognitive computing: some perspectives. Scientia Iranica, 2011,18(3):590-592. [doi: 10.1016/j.scient. 2011.04.010]
    [23] Ogiela MR, You I. Cognitive and secure computing in information management. Int'l Journal of Information Management, 2013, 33(2):243-244. [doi: 10.1016/j.ijinfomgt.2012.11.009]
    [24] Wang M, Suda T. The bio-networking architecture. In: Proc. of the 2001 Symp. on Applications and the Internet. 2001. 43-53. [doi: 10.1109/SAINT.2001.905167]
    [25] Garlan D, Cheng S. Rainbow: Architecture-based self-adaptation with reusable infrastructure. IEEE Computer, 2004,37(10):46- 54. [doi: 10.1109/MC.2004.175]
    [26] Schmid S, Eggert L, Brunner, M, Quittek J. Towards autonomous network domains. In: Proc. of the 25th IEEE Int'l Conf. on Computer Communications (INFOCOM). 2006. 1-6. [doi: 10.1109/INFOCOM.2006.351]
    [27] Zhao WT, Yin JP, Long J. A cognition model of attack prediction in security situation awareness systems. Computer Engineering and Science, 2007,29(11):17-19 (in Chinese with English abstract).
    [28] Zang C, Huang ZD, Dong JX. State-Based generalized autonomic computing models. Journal of Computer-aided Design and Computer Graphics, 2007,19(11):1476-1481 (in Chinese with English abstract).
    [29] Feng GS, Wang HQ, Ma CG, Li BY, Zhao Q. Dynamic self-configuration of user QoS oriented to cognitive network. Journal on Communications, 2010,31(3):133-140 (in Chinese with English abstract).
    [30] Ma LR, Yang L, Wang JX. Research on security information fusion from multiple heterogeneous sensors. Journal of System Simulation, 2008,20(4):981-989 (in Chinese with English abstract).
    [31] Chen JJ. Multi-Sensor administration and information fusion [MS. Thesis]. Xian: Northwester Polytechnical University, 2002 (in Chinese with English abstract).
    [32] Zhao YX, Chen XD, Chen X. BFOA-Based optimal point selection for Lagrange interpolation. Journal of System Simulation, 2012, 24(10):2232-2235 (in Chinese with English abstract).
    [33] Liu XW, Wang HQ, Yu JG, Cao BX, Gao ZH. Network security situation awareness model based on multi-source fusion. Advanced Science Letters, 2012,5(2):775-779. [doi: 10.1166/asl.2012.1852]
    附中文参考文献:
    [7] 陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法.软件学报,2006,17(4):885-897. http://www.jos.org.cn/ 1000-9825/17/885.htm [doi: 10.1360/jos170885]
    [9] 韦勇,连一峰,冯登国.基于信息融合的网络安全态势评估模型.计算机研究与发展,2009,46(3):353-362.
    [12] 龚正虎,卓莹.网络态势感知研究.软件学报,2010,21(7):1605-1619. http://www.jos.org.cn/1000-9825/3835.htm [doi: 10. 3724/SP.J.1001.2010.03835]
    [13] 张勇,谭小彬,崔孝林,奚宏生.基于Markov博弈模型的网络安全态势感知方法.软件学报,2011,22(3):495-508. http://www.jos. org.cn/1000-9825/3751.htm [doi: 10.3724/SP. J.1001.2011.03751]
    [27] 赵文涛,殷建平,龙军.安全态势感知系统中攻击预测的认知模型.计算机工程与科学,2007,29(11):17-19.
    [28] 臧铖,黄忠东,董金祥.基于状态的通用自主计算模型.计算机辅助设计与图形学学报,2007,19(11):1476-1481.
    [29] 冯光升,王慧强,马春光,李冰洋,赵倩.面向认知网络的用户QoS动态自配置方法.通信学报,2010,31(3):133-140.
    [30] 马琳茹,杨林,王建新.多源异构安全信息融合关联技术研究系.系统仿真学报,2008,20(4):981-989.
    [31] 陈继军.多传感器管理及信息融合[硕士学位论文].西安:西北工业大学,2002.
    [32] 赵翼翔,陈新度,陈新.基于BFOA的拉格朗日插值点最优配置.系统仿真学报,2012,24(10):2232-2235.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

刘效武,王慧强,吕宏武,禹继国,张淑雯.网络安全态势认知融合感控模型.软件学报,2016,27(8):2099-2114

Copy
Share
Article Metrics
  • Abstract:3712
  • PDF: 5973
  • HTML: 1934
  • Cited by: 0
History
  • Received:September 22,2013
  • Revised:May 08,2015
  • Online: August 08,2016
You are the first2035272Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063