Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Comparative Study of Visualization for Network Situational Assessment using HPPAL Approach

Print
PDF
IJCA Proceedings on National Conference on Contemporary Computing
© 2017 by IJCA Journal
NCCC 2016 - Number 1
Year of Publication: 2017
Authors:
Yashi Sharma
Rupali Bhartiya
Akhilesh Sharma

Yashi Sharma, Rupali Bhartiya and Akhilesh Sharma. Article: Comparative Study of Visualization for Network Situational Assessment using HPPAL Approach. IJCA Proceedings on National Conference on Contemporary Computing NCCC 2016(1):32-35, April 2017. Full text available. BibTeX

@article{key:article,
	author = {Yashi Sharma and Rupali Bhartiya and Akhilesh Sharma},
	title = {Article: Comparative Study of Visualization for Network Situational Assessment using HPPAL Approach},
	journal = {IJCA Proceedings on National Conference on Contemporary Computing},
	year = {2017},
	volume = {NCCC 2016},
	number = {1},
	pages = {32-35},
	month = {April},
	note = {Full text available}
}

Abstract

It additionally makes the representation of assault conditions by making the diagrams and plots which enormously enhances the rate and the quality measures of persons or machines choice making. This work is using so as to go to distinguish the real system status different measurements of the premise of which precise choices can be made. Basically the work is utilizing four classifications of measurements such as defined as the skill to effectively determine an overall computer network status based on relationships between security measures in multiple dimensions. In present era pc system is taken as a core component of various technology supported area such as banking sector, emergency systems, crisis framework etc [1]. This document presents some of the requirement associated with the visualization for network situational assessment. In this paper we introduce a novel network situational awareness tool that perceive network security situation comprehensively. Visualization is one of the best mean for a system to present its result to the end user and through maps and data plots humans can easily understand the whole process and improve their decision making. Our current focus is on subjective area rather than objective study of network security. To understand and measure the overall security of a network, one must first understand the vulnerabilities from multiple views and how they can combine to construct an attack [2].

References

  • Rongrong Xi, Shuyuan Jin, Xiaochun Yun and Yongzheng Zhang, "CNSSA: A Comprehensive Network Security Situation Awareness System", in International Joint Conference of IEEE TrustCom, ISSN: 978-0-7695-4600-1/11, doi: 10. 1109/TrustCom. 2011. 62, 2014.
  • William Streilein, Kendra Kratkiewicz, Michael Sikorski, Keith Piwowarski, Seth Webster, "PANEMOTO: Network Visualization of Security Situational Awareness through Passive Analysis ", in Workshop on Information Assurance United States Military Academy, Proceedings of the IEEE, 2007.
  • Rongzhen FAN, Mingkuai ZHOU, "Network Security Awareness and Tracking Method by GT", in Journal of Computational Information Systems, Binary Information Press, ISSN: 1043-1050, Vol. 9: Issue 3, 2013.
  • Igor Kotenko and Andrew Chechulim, "Attack Modelling and Security Evaluation in SIEM System", in International Transaction of System Science and Application, SIWN Press,, ISSN:2051-5642, Vol. 8, Dec 2012.
  • Bon K. Sy, "Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS", in Elsevier Journal of Information Fusion, ISSN: 1566-2535, doi:10. 1016/j. inffus. 2009. 01. 001, 2009.
  • Timothy Shimeall, Sidney Faber, Markus DeShon and Andrew Kompanek, "Using SiLK for Network Traffic Analysis", in CERT R Network Situational Awareness Group, Carnegie Mellon University. September 2010.
  • William Yurcik, "Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite", in 19th Large Installation System Administration Conference (LISA '05), 2005.
  • Xiaoxin Yin, William Yurcik and Michael Treaster, "VisFlowConnect: NetFlow Visualizations of Link Relationships for Security Situational Awareness", in ACM, doi: 1­58113­974­8/04/0010, Oct 2004.
  • Xiaoxin Yin, William Yurcik and Adam Slagell, "The Design of VisFlowConnect-IP: a Link Analysis System for IP Security", in National Center for Advanced Secure Systems Research (NCASSR), 2010.
  • Ji-Bao Lai, Hui-Qiang Wang, Xiao-Wu Liu and Ying Liang, "WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization", in Journal of computer science and technology, Vol. 23, Issue 3, ISSN: 0222:0230, Mar 2008.
  • SunJun Liu, Le Yu and Jin Yang, "Research on Network Security Situation Awareness Technology based on AIS", in International Journal of Knowledge and Language Processing, ISSN: 2191-2734, Volume 2, Number 2, April 2011.
  • L Wang, S Noel, S Jajodia, Minimum-cost network hardening using attack graphs, Computer Communications, Vol. 29, 2006.
  • L Wang, T Islam, T Long, A. Singhal, S. Jajodia, An attack graph-based probabilistic security metric, Proc. of the 22nd annual IFIP WG 11. 3 working conference on Data and Applications Security. Springer-Verlag Berlin, pp. 283-296.
  • L Williams, GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool, Proc. of the 5th international workshop on Visualization for Computer Security, Springer- Verlag Berlin, 2008.
  • M M Gamal, D Hasan, A F Hegazy, A Security Analysis Framework Powered by an Expert System, International Journal of Computer Science and Security. Vol. 4, No. 6, 2011, pp. 505–526.
  • M McQueen, T McQueen, W Boyer, M Chaffin, Empirical estimates and observations of 0-day vulnerabilities, Hawaii International Conference on System Sciences, 2009.
  • M Y Huang, T M Wicks, A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis, Computer Networks, Vol. 31, NewYork, NY, USA, 1999, pp. 2465-2475.