{"title":"基于漏洞关联分析的网络态势风险评估","authors":"X. Nan, R. Chen, Hongtao Tian, Yupeng Liu","doi":"10.1109/PIC53636.2021.9687007","DOIUrl":null,"url":null,"abstract":"For the question that situation assessment methods for the analysis of existing vulnerabilities are associated with the lack of analysis of vulnerability assessments, which leads to the poor accuracy assessment, the paper presents a method for network vulnerabilities associated with risk assessment situation analysis. The method improves the existing hierarchical network situation assessment, with the system being divided into three levels, which are loopholes at the bottom, host in the middle, and network system at the top. Based on the security risk indices, we calculate the vulnerability, the host, the entire network system risk index, and evaluate and analyze the security posture of the entire network, to solve the problem of inaccurate assessment. The experiments show that the method improves the accuracy of the assessment of network situation assessment greatly.","PeriodicalId":297239,"journal":{"name":"2021 IEEE International Conference on Progress in Informatics and Computing (PIC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Network Situation Risk Assessment Based on Vulnerability Correlation Analysis\",\"authors\":\"X. Nan, R. Chen, Hongtao Tian, Yupeng Liu\",\"doi\":\"10.1109/PIC53636.2021.9687007\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For the question that situation assessment methods for the analysis of existing vulnerabilities are associated with the lack of analysis of vulnerability assessments, which leads to the poor accuracy assessment, the paper presents a method for network vulnerabilities associated with risk assessment situation analysis. The method improves the existing hierarchical network situation assessment, with the system being divided into three levels, which are loopholes at the bottom, host in the middle, and network system at the top. Based on the security risk indices, we calculate the vulnerability, the host, the entire network system risk index, and evaluate and analyze the security posture of the entire network, to solve the problem of inaccurate assessment. The experiments show that the method improves the accuracy of the assessment of network situation assessment greatly.\",\"PeriodicalId\":297239,\"journal\":{\"name\":\"2021 IEEE International Conference on Progress in Informatics and Computing (PIC)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Progress in Informatics and Computing (PIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PIC53636.2021.9687007\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Progress in Informatics and Computing (PIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PIC53636.2021.9687007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network Situation Risk Assessment Based on Vulnerability Correlation Analysis
For the question that situation assessment methods for the analysis of existing vulnerabilities are associated with the lack of analysis of vulnerability assessments, which leads to the poor accuracy assessment, the paper presents a method for network vulnerabilities associated with risk assessment situation analysis. The method improves the existing hierarchical network situation assessment, with the system being divided into three levels, which are loopholes at the bottom, host in the middle, and network system at the top. Based on the security risk indices, we calculate the vulnerability, the host, the entire network system risk index, and evaluate and analyze the security posture of the entire network, to solve the problem of inaccurate assessment. The experiments show that the method improves the accuracy of the assessment of network situation assessment greatly.