CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

ICARFAD: A Novel Framework for Improved Network Security Situation Awareness

by Chanchal Sharma, Vandana Kate
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 87 - Number 19
Year of Publication: 2014
Authors: Chanchal Sharma, Vandana Kate
10.5120/15461-4064

Chanchal Sharma, Vandana Kate . ICARFAD: A Novel Framework for Improved Network Security Situation Awareness. International Journal of Computer Applications. 87, 19 ( February 2014), 26-31. DOI=10.5120/15461-4064

@article{ 10.5120/15461-4064,
author = { Chanchal Sharma, Vandana Kate },
title = { ICARFAD: A Novel Framework for Improved Network Security Situation Awareness },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 87 },
number = { 19 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume87/number19/15461-4064/ },
doi = { 10.5120/15461-4064 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:06:22.325345+05:30
%A Chanchal Sharma
%A Vandana Kate
%T ICARFAD: A Novel Framework for Improved Network Security Situation Awareness
%J International Journal of Computer Applications
%@ 0975-8887
%V 87
%N 19
%P 26-31
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Networking components and technologies is continuously proving their presence in various core areas of business like IT, Health Care, Stocks, and Emergencies with Military systems. It is possible by applying multiple system phenomenons of compatibility, interoperability and integration of different categories of devices and users. As the usage of information is increasing the transaction and data security needs to be provided effectively. It will serve as a critical and important task which assures data protection. This unexpected and frequent changes in the system is measured which gives a direction of vulnerable behaviour and the criticality of affecting the process. Accessing this information through actual network conditions and changes for improving the security is comes under the area of situational awareness system. This work proposes a novel ICARFAD (Information Collection, Assessment and Response, Feedback and Alerts Decisions) based situation awareness mechanism which gathers current network condition and clearly defines the boundaries by which security solutions can be designed effectively. It reflects all the changes made in configurations and methods taken as a security measures by maintaining a database which later on used to make the decisions for network security improvements. It also makes the visualization of attack conditions by making the graphs and plots which greatly improves the rate and the quality measures of persons or machines decision making.

References
  1. Rongrong Xi, Shuyuan Jin, Xiaochun Yun and Yongzheng Zhang, "CNSSA: A Comprehensive Network Security Situation Awareness System", in International Joint Conference of IEEE TrustCom, ISSN: 978-0-7695-4600-1/11, doi: 10. 1109/TrustCom. 2011. 62, 2011.
  2. Wang, C. Yao, A. Singhal and S. Jajodia, "Network Security Analysis Using Attack Graphs :Interactive Analysis of Attack Graphs using Relational Queries", in proceedings of IFIP WG Working Conference on Data and Application Security (DBSEC), 11. 3 pages 119-132, 2006.
  3. Mr. Marc Grégoire and Mr. Luc Beaudoin, "Visualisation for Network Situational Awareness in Computer Network Defence", in proceedings of visualisation and the common operational picture meeting RTO-MP-IST-043, Paper 20. 2008.
  4. White Paper on, "Public Safety and Homeland Security Situational Awareness", in ESRI, February 2008.
  5. P. Barford, M. Dacier, T. G. Dietterich, M. Fredrikson, "Cyber SA: Situational Awareness", in Cyber Defense University of Wisconsin, 2009.
  6. Rostyslav Barabanov, Stewart Kowalski and Louise Yngström, "Information Security Metrics", DSV Report series No 11-007, Mar 25, 2011
  7. Pallavi Vaidya and S. K. Shinde, "Application for Network Security Situation Awareness", in International Conference in Recent Trends in Information Technology and Computer Science (ICRTITCS - 2012), IJCA, ISSN: 0975 – 8887, 2012.
  8. Xiu-Zhen Chena, Qing-Hua Zhenga, Xiao-Hong Guana,b, Chen-Guang Lina, Jie Sun, "Multiple behavior information fusion based quantitative threat evaluation", in Elsevier Journal of Computers & Security , ISSN: 0167-4048 ,doi:10. 1016/j. cose. 2004. 08. 009,2005. pp 218-231
  9. Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, and Sushil Jajodia, "An Attack Graph-Based Probabilistic Security Metric", in National Institute of Standards and Technology Computer Security Division; Concordia Institute for Information Systems Engineering, Montreal, Canada.
  10. Marianne Swanson, Nadya Bartol, John Sabato, Joan Hash, and Laurie Graffo, "Security Metrics Guide for Information Technology Systems", in NIST Special Publication 800-55, July 2003.
  11. William Streilein, Kendra Kratkiewicz, Michael Sikorski, Keith Piwowarski, Seth Webster, "PANEMOTO: Network Visualization of Security Situational Awareness through Passive Analysis", in Workshop on Information Assurance United States Military Academy, Proceedings of the IEEE, 2007.
  12. Rongzhen FAN, Mingkuai ZHOU, "Network Security Awareness and Tracking Method by GT", in Journal of Computational Information Systems, Binary Information Press, ISSN: 1043-1050, Vol. 9: Issue 3, 2013.
  13. Igor Kotenko and Andrew Chechulim, "Attack Modelling and Security Evaluation in SIEM System", in International Transaction of System Science and Application, SIWN Press,, ISSN:2051-5642, Vol. 8, Dec 2012.
  14. Bon K. Sy, "Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS", in Elsevier Journal of Information Fusion, ISSN: 1566-2535, doi:10. 1016/j. inffus. 2009. 01. 001, 2009.
  15. Timothy Shimeall, Sidney Faber, Markus DeShon and Andrew Kompanek, "Using SiLK for Network Traffic Analysis", in CERT R Network Situational Awareness Group, Carnegie Mellon University. September 2010.
  16. William Yurcik, "Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite", in 19th Large Installation System Administration Conference (LISA '05), 2005.
  17. Xiaoxin Yin, William Yurcik and Michael Treaster, "VisFlowConnect: NetFlow Visualizations of Link Relationships for Security Situational Awareness", in ACM, doi: 1­58113­974­8/04/0010, Oct 2004.
  18. Xiaoxin Yin, William Yurcik and Adam Slagell, "The Design of VisFlowConnect-IP: a Link Analysis System for IP Security", in National Center for Advanced Secure Systems Research (NCASSR), 2010.
  19. Ji-Bao Lai, Hui-Qiang Wang, Xiao-Wu Liu and Ying Liang, "WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization", in Journal of computer science and technology, Vol. 23, Issue 3, ISSN: 0222:0230, Mar 2008.
  20. SunJun Liu, Le Yu and Jin Yang, "Research on Network Security Situation Awareness Technology based on AIS", in International Journal of Knowledge and Language Processing, ISSN: 2191-2734, Volume 2, Number 2, April 2011.
  21. P. Mell and K. Scarfone, "Improving the Common Vulnerability Scoring System", in proceedings of IET Information Security, doi:10. 1049/iet-ifs:20060055, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Attack Graphs Situational Metrics ICARFAD (Information Collection Assessment and Response Feedback and Alerts Decisions)