Browse > Article
http://dx.doi.org/10.3837/tiis.2021.12.015

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data  

Lin, Weiwei (School of Big Data and Artificial Intelligence, Fujian Polytechnic Normal University)
Yang, Chaofan (School of Computer Science and Mathematics, Fujian University of Technology)
Zhang, Zeqing (School of Information Science and Engineering, Xiamen University)
Xue, Xingsi (School of Computer Science and Mathematics, Fujian University of Technology)
Haga, Reiko (CommScope Japan KK)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.12, 2021 , pp. 4531-4544 More about this Journal
Abstract
Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.
Keywords
One-way transmission state; Information security vulnerability; Risk quantification; Assessment; The weight;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. N. Lei, Y. Q. Zhang, C. S. Wu and H. Ma, "A System for Scoring the Exploitability of Vulnerability Based Types," Journal of Computer Research and Development, vol. 54, no. 10, pp. 2296-2309, 2017.
2 C. Lv, J. Zhang, Z. Sun and G. Qian, "Information Flow Security Models for Cloud Computing," Computers, Materials & Continua, vol. 65, no. 3, pp. 2687-2705, 2020.   DOI
3 G. Yang, M. Yang, S. Salam and J. Zeng, "Research on Protecting Information Security Based on the Method of Hierarchical Classification in the Era of Big Data," Journal of Cyber Security, vol. 1, no. 1, pp, 19-28, 2019.
4 Z. Y. Wei, M. D. Wu, N. Ma, M. Lei and W. Bi, "Vulnerability Risk Assessment of IoT System Based on Game Model," Journal of Information Security Research, vol. 4, pp. 48-55, 2018.
5 W. Fang, F. Zhang, Y. Ding and J. Sheng, "A New Sequential Image Prediction Method Based on LSTM andDCGAN," Computers, Materials & Continua, vol. 64, no. 1, pp. 217-231, 2020.   DOI
6 G. J. Fan and L. L. Yang, "Coverage Holes Discovery Algorithm without Location Information in Wireless Sensor Networks," Application Research of Computers, vol. 6, pp. 1826-1829, 2018.
7 W. G. Wu, J. L. Yang, and J. Geng, "Risk Assessment of Central Hospital Information System Vulnerabilities Based on WOA-KELM," Information Technology, vol. 43(4), pp. 96-100, 2019.
8 W. Fang, L. Pang and W. N. Yi, "Survey on the Application of Deep Reinforcement Learning in Image Processing," Journal on Artificial Intelligence, vol. 2, no. 1, pp. 39-58, 2020.   DOI
9 Y. H. Liu, X. L. Gao, M. C. Zhu and P. H. Su, "Research on Classification Method of Network Security Data Based on Data Feature Learning," Netinfo Security, vol. 19(10), pp. 50-56, 2019.
10 B. Y. Zhang and M. Wang, "Research on Quantization Method of Network Attack and Defense Based on CVSS Vulnerability Score," Journal of Ordnance Equipment Engineering, vol. 4, pp. 147-150, 2018.
11 J. Li, P. F. Cao and Yang Jun, "Research on NoC static vulnerability detection system based on big data technology," Modern Electronics Technique, vol. 42(21), pp. 77-81, 2019.
12 X. X. Ren, J. Chen, C. Y. Li, Y. X. Yang, "Hazard Assessment of IoT Vulnerabilities Correlation Based on Risk Matrix," Netinfo Security, vol. 11, pp. 86-93, 2018.
13 Y. Xiao, "research on network data security check based on a novel feature transformation algorithm," Bulletin of Science and Technology, vol. 35(5), pp. 127-131, 2019.
14 M. Fang, "Instantiated Computer Network Threat Risk Assessment Model for UML Model," Communications Technology, vol. 5, pp. 1234-1241, 2019.
15 F. Wang, L. Hong, X. Gu, "Risk Assessment Algorithm of Software Vulnerability Based on Sigmoid Function," Journal of Information Security Research, vol. 11, pp. 993-996, 2018.
16 G. C. Qian, Q. Ding and S. J. Zhang, "Research on Information Security Vulnerability Awareness and Early Warning Technology," Techniques of Automation and Applications, vol. 2, pp. 51-55, 2018.
17 W. Han, Z. Tian, Z. Huang, L. Zhong and Y. Jia, "System Architecture and Key technologies of network security situation awareness system yhsas," Computers, Materials & Continua, vol. 59, no. 1, pp. 167-180, 2019.   DOI
18 F. Zhao, "Research on Network Security Trend Perception In One-Way Transmission Process of Information," Computer Simulation, vol. 6, pp. 456-460, 2018.
19 Y. Y. Feng, "Network Information Encryption Vulnerability Detection System Based on Artificial Fish Swarm Algorithm," Information & Communications, vol. 12, pp. 53-57, 2019.
20 S. L. Ma, "Simulation Research on Real Time Detection of Network Information Encryption Vulnerability," Computer Simulation, vol. 3, pp. 328-331, 2018.