DOI QR코드

DOI QR Code

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei (School of Big Data and Artificial Intelligence, Fujian Polytechnic Normal University) ;
  • Yang, Chaofan (School of Computer Science and Mathematics, Fujian University of Technology) ;
  • Zhang, Zeqing (School of Information Science and Engineering, Xiamen University) ;
  • Xue, Xingsi (School of Computer Science and Mathematics, Fujian University of Technology) ;
  • Haga, Reiko (CommScope Japan KK)
  • Received : 2021.07.12
  • Accepted : 2021.10.14
  • Published : 2021.12.31

Abstract

Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

Keywords

References

  1. W. G. Wu, J. L. Yang, and J. Geng, "Risk Assessment of Central Hospital Information System Vulnerabilities Based on WOA-KELM," Information Technology, vol. 43(4), pp. 96-100, 2019.
  2. W. Han, Z. Tian, Z. Huang, L. Zhong and Y. Jia, "System Architecture and Key technologies of network security situation awareness system yhsas," Computers, Materials & Continua, vol. 59, no. 1, pp. 167-180, 2019. https://doi.org/10.32604/cmc.2019.05192
  3. K. N. Lei, Y. Q. Zhang, C. S. Wu and H. Ma, "A System for Scoring the Exploitability of Vulnerability Based Types," Journal of Computer Research and Development, vol. 54, no. 10, pp. 2296-2309, 2017.
  4. C. Lv, J. Zhang, Z. Sun and G. Qian, "Information Flow Security Models for Cloud Computing," Computers, Materials & Continua, vol. 65, no. 3, pp. 2687-2705, 2020. https://doi.org/10.32604/cmc.2020.011232
  5. F. Zhao, "Research on Network Security Trend Perception In One-Way Transmission Process of Information," Computer Simulation, vol. 6, pp. 456-460, 2018.
  6. G. Yang, M. Yang, S. Salam and J. Zeng, "Research on Protecting Information Security Based on the Method of Hierarchical Classification in the Era of Big Data," Journal of Cyber Security, vol. 1, no. 1, pp, 19-28, 2019.
  7. Z. Y. Wei, M. D. Wu, N. Ma, M. Lei and W. Bi, "Vulnerability Risk Assessment of IoT System Based on Game Model," Journal of Information Security Research, vol. 4, pp. 48-55, 2018.
  8. W. Fang, F. Zhang, Y. Ding and J. Sheng, "A New Sequential Image Prediction Method Based on LSTM andDCGAN," Computers, Materials & Continua, vol. 64, no. 1, pp. 217-231, 2020. https://doi.org/10.32604/cmc.2020.06395
  9. X. X. Ren, J. Chen, C. Y. Li, Y. X. Yang, "Hazard Assessment of IoT Vulnerabilities Correlation Based on Risk Matrix," Netinfo Security, vol. 11, pp. 86-93, 2018.
  10. W. Fang, L. Pang and W. N. Yi, "Survey on the Application of Deep Reinforcement Learning in Image Processing," Journal on Artificial Intelligence, vol. 2, no. 1, pp. 39-58, 2020. https://doi.org/10.32604/jai.2020.09789
  11. Y. H. Liu, X. L. Gao, M. C. Zhu and P. H. Su, "Research on Classification Method of Network Security Data Based on Data Feature Learning," Netinfo Security, vol. 19(10), pp. 50-56, 2019.
  12. B. Y. Zhang and M. Wang, "Research on Quantization Method of Network Attack and Defense Based on CVSS Vulnerability Score," Journal of Ordnance Equipment Engineering, vol. 4, pp. 147-150, 2018.
  13. Y. Y. Feng, "Network Information Encryption Vulnerability Detection System Based on Artificial Fish Swarm Algorithm," Information & Communications, vol. 12, pp. 53-57, 2019.
  14. G. J. Fan and L. L. Yang, "Coverage Holes Discovery Algorithm without Location Information in Wireless Sensor Networks," Application Research of Computers, vol. 6, pp. 1826-1829, 2018.
  15. G. C. Qian, Q. Ding and S. J. Zhang, "Research on Information Security Vulnerability Awareness and Early Warning Technology," Techniques of Automation and Applications, vol. 2, pp. 51-55, 2018.
  16. S. L. Ma, "Simulation Research on Real Time Detection of Network Information Encryption Vulnerability," Computer Simulation, vol. 3, pp. 328-331, 2018.
  17. Y. Xiao, "research on network data security check based on a novel feature transformation algorithm," Bulletin of Science and Technology, vol. 35(5), pp. 127-131, 2019.
  18. M. Fang, "Instantiated Computer Network Threat Risk Assessment Model for UML Model," Communications Technology, vol. 5, pp. 1234-1241, 2019.
  19. J. Li, P. F. Cao and Yang Jun, "Research on NoC static vulnerability detection system based on big data technology," Modern Electronics Technique, vol. 42(21), pp. 77-81, 2019.
  20. F. Wang, L. Hong, X. Gu, "Risk Assessment Algorithm of Software Vulnerability Based on Sigmoid Function," Journal of Information Security Research, vol. 11, pp. 993-996, 2018.