Title: Situation evaluate on hierarchical network security based on D-S evidence theory

Authors: Chundong Wang; Yu Zhang

Addresses: Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Ministry of Education Tianjin University of Technology, Tianjin, China; Key Laboratory of Computer Vision and System, Ministry of Education Tianjin University of Technology, Tianjin, China ' Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Ministry of Education Tianjin University of Technology, Tianjin, China; Key Laboratory of Computer Vision and System, Ministry of Education Tianjin University of Technology, Tianjin, China

Abstract: With the development of network technology, the internet era is coming; the network security issues have become increasingly prominent. It is more important to conduct a comprehensive, accurate and quantitative evaluation for today's network security. Therefore, this paper proposed situation evaluation model for hierarchical network security based on D-S evidence theory. The model uses the information collected from multi-source sensors as source data, which was used for fusion and submitting to the upper layer based on D-S evidence theory. We combined the existing vulnerability information and threats in service layer by scanning the log files and alarm events collected from sensors with analytical hierarchy process (AHP) to decide the relative weight of each factor. After evaluating the situational values of each node on host layer, we can finally evaluate network security situational values on the whole.

Keywords: network security; multi-source sensors; D-S evidence theory; analytical hierarchy process; AHP; communication networks; Dempster–Shafer theory; DST; vulnerability information; threats; service layer; log files; alarm events.

DOI: 10.1504/IJCNDS.2014.064633

International Journal of Communication Networks and Distributed Systems, 2014 Vol.13 No.3/4, pp.245 - 256

Received: 02 Sep 2013
Accepted: 18 Apr 2014

Published online: 30 Aug 2014 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article