CFP last date
22 April 2024
Reseach Article

Application for Network Security Situation Awareness

Published on February 2013 by Pallavi Vaidya, S. K. Shinde
International Conference on Recent Trends in Information Technology and Computer Science 2012
Foundation of Computer Science USA
ICRTITCS2012 - Number 4
February 2013
Authors: Pallavi Vaidya, S. K. Shinde
86a1b080-eca9-4014-89f6-b0ea5e4f84fb

Pallavi Vaidya, S. K. Shinde . Application for Network Security Situation Awareness. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 4 (February 2013), 28-32.

@article{
author = { Pallavi Vaidya, S. K. Shinde },
title = { Application for Network Security Situation Awareness },
journal = { International Conference on Recent Trends in Information Technology and Computer Science 2012 },
issue_date = { February 2013 },
volume = { ICRTITCS2012 },
number = { 4 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 28-32 },
numpages = 5,
url = { /proceedings/icrtitcs2012/number4/10272-1369/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science 2012
%A Pallavi Vaidya
%A S. K. Shinde
%T Application for Network Security Situation Awareness
%J International Conference on Recent Trends in Information Technology and Computer Science 2012
%@ 0975-8887
%V ICRTITCS2012
%N 4
%P 28-32
%D 2013
%I International Journal of Computer Applications
Abstract

This paper is based on the Network security situation awareness. It describes the framework designed to generate security graph. The proposed framework is easy to install and provides protection against denial of service and distributed denial of service attacks. It also displays security analysis of the sensors attached to the network

References
  1. Bass, T. , "Multi sensor Data Fusion for Next Generation Distributed Intrusion Detection Systems," Invited Paper 1999 IRIS National Symposium on Sensor and Data Fusion, pp. 24-27, May 1999.
  2. Bass, T. , "Intrusion Detection Systems and Multisensor Data Fusion," Communications of the ACM, Vol. 43, No. 4, April 2000.
  3. Endsley, M. , "Toward a theory of situation awareness in dynamic systems, " Human Factors, Vol. 37, No. 1, pp. 32-64, 2005.
  4. Lai Jibao, Wang Huiqiang, and Zhu Liang, "Study of Network Security Situation Awareness Model Based on Simple Additive Weight and Grey Theory," 2006.
  5. Liu Mixi, Yu Dongmei and Zhang Qiuyu et aI. , "Network Security Situation Assessment Based on Data Fusion, " 2008 Workshop on Knowledge Discovery and Data Mining, 2008.
  6. Yu Dong and Frincke, D. , "Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster-Shafer Theory, " 43rd ACM Southeast Conference, March 18-20, 2005.
  7. Wang Huiqiang, Lai Jibao, and Ying Liang, "Network Security Situation Awareness Based on Heterogeneous Multi-Sensor Data Fusion and Neural Network, " Second International Multisymposium on Computer and Computational Sciences, 2007.
  8. Stefanos Manganaris, Marvin Christensen, Dan Zerkle, et al. A data mining analysis of RTID alarms. Computer Networks, 2000, 34(4):571-577
  9. Bass, T. and Robichaux, R. , "Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations," Proceedings of IEEE Military Communications Conference, vol. 1, pp. 64-70, 200 I.
  10. Zhang Yong, Tan Xiaobin and Xi Hongsheng, "A Novel Approach to Network Security Situation Awareness Based on MUlti-perspective Analysis, " IEEE 2007 International Conference on Computational Intelligence and Security, 2007.
  11. Chen XZ, Zheng QH and Guan XH et aI. , "Quantitative hierarchical threat evaluation model for network security, " Journal of Software, Vol. 17 , No. 4, pp. 885-897, April 2006, http://www. jos. org. cn/lOOO- 9825/17/885. htm, Accessed on Jun 2008.
  12. J Hall, J Pei, Y Yin. Mining frequent patterns without candidate generation. 2000 ACM. SIGMOD int'I Conf on Management of Data (SIGMOD'OO), DallaS, TX, 2000
  13. Mika Klemettinen. A knowledge discovery methodology for telecommunication network alarm databases. [Ph 0 dissertation]. Helsinki: University of Helsinki, Finland, 1999
  14. Haines JW, Lippmann RP, Fried OJ, Tran E, Boswell S, Zissman MA. DARPA intrusion detection system evaluation: Design and procedures. Technical Report 1062, Lexington: MIT Lincoln Laboratory, 1999.
  15. Lang F, Wang C, Gouqing M. " A Framework for network security situation awareness based on knowledge discovery" 2010 2nd International conference on computer Engineering and Technology
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Situation Awareness Graph Knowledge Discovery