Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2010, Vol. 33 ›› Issue (6): 121-124.doi: 10.13190/jbupt.201006.121.longm

• Reports • Previous Articles     Next Articles

Network Security Assessment Based on Node Correlated HMM

  

  • Received:2009-12-29 Revised:2010-05-12 Online:2010-12-28 Published:2011-01-07

Abstract:

Aimed at the problem that the node correlation in network is not considered in hidden Markov model (HMM) network risk assessment, combining graph theory model, the network node correlation (NNC) state transition matrix is built. With the intrusion defective system(IDS) alert as input, using modified HMM model the attacking route is figured out. Furthermore, the successful probability of any attacking sequence with any length can be got as well. The method can help to find vulnerabilities of network nodes, and reflect network risk well. Experiment demonstrates the validity of it. 

Key words: hidden Markov model, network node correlation, graph theory, network security