Survey of Technology in Network Security Situation Awareness
Abstract
:1. Introduction
- The first is to be comprehensive, to perceive the overall situation and all network security events from the perspective of the entire network;
- The second is to be able to accurately and effectively detect network attacks;
- The third is real-time network attacks that break out instantaneously, and real-time detection and real-time evaluation are the core indicators of NSSA.
2. Preliminaries and Overview
2.1. From Situation Awareness (SA) to NSSA
2.2. Concept and Model
2.2.1. Model Overview
2.2.2. Explanation of the Example
2.3. Taxonomy
3. Key Technologies of NSSA
3.1. Network Security Situation Element Acquisition
3.1.1. Literature Overview
3.1.2. Strengths and Weaknesses Analysis
3.2. Network Security Situation Assessment
Ref. | Approach/Model | Description | Shortcomings |
---|---|---|---|
[63] | Analytic hierarchy process (AHP) | Quantitative evaluation at four levels | High time complexity |
[64,65,66] | AHP | Hierarchical analysis of multi-source data | High time complexity |
[67] | AHP | Multi-layered methodology for situation assessment | Poor real-time performance |
[68] | AHP and fuzzy evaluation method | AHP combined with fuzzy evaluation | Low accuracy |
[69] | Fuzzy inference model | Generate risk assessment results using fuzzy inference models | Poor real-time performance |
[70,71] | Rough set theory | Build decision tables for assessment | Low precision and high time complexity |
[72] | Rough set and fuzzy rough set | Mix information processing improves output accuracy | High time complexity |
[73] | Deep learning | Adaptive momentum into the training process of the neural network | Over-dependence on parameter selection |
[74] | Deep neural network | Combine Deep Autoencoder (DAE) with Deep Neural Network (DNN) | High time complexity |
3.2.1. Literature Overview
3.2.2. Strengths and Weaknesses Analysis
3.3. Network Security Situation Prediction
3.3.1. Literature Overview
Ref. | Approach/Model | Description | Shortcomings |
---|---|---|---|
[88] | Attack graph | Identify attack paths | High time complexity |
[89] | Bayesian models | Infer the probabilities of sensors and actuators to be compromised | Easy to produce overfitting and reduce the prediction accuracy |
[93] | Fuzzy Markov chain | Combines historical data with the level of threat, predict the next threat by value using fuzzy Markov chains | Low prediction accuracy |
[92] | game theory | Based on the use of game theory against nature to identify the optimal variant of a bid estimate | Algorithmic complexity is too high |
[94,95,96,97] | BP neural network | Adjust and optimize parameters in time through continuous learning | Slow convergence and easy to fall into local optimal solution |
[98] | Wavelet neural network | Optimized by genetic algorithms | Low prediction accuracy |
[99,100] | RBF neural network | Through training the RBF neural network, find out the nonlinear mapping relationship | Low learning accuracy and poor generalization ability |
[101] | Cyclic neural network | Based on recurrent neural network with gated recurrent unit | Only valid for data with sequence properties |
[102] | SVM | Use mapreduce to perform distributed training on SVMs to improve training speed | too sensitive to parameters |
[103] | SVM | Optimize SVM parameters based on grey wolf optimization algorithm | Can’t handle massive data |
[104,105,106,107] | deep learning/Stacked Denoising Auto-Encoders (SAE) /association rules mining | Improve prediction accuracy and reduce algorithm complexity | Overfitting of low-dimensional data High complexity of high-dimensional data |
3.3.2. Strengths and Weaknesses Analysis
4. Classic Use Cases of NSSA
4.1. Lobster Program
4.2. Treasure Map
4.3. NSADP Project
5. Research Challenges and Directions
5.1. Big Data
5.2. Cyberspace Mapping
5.3. AI Technology
5.4. NSSA Visualization
5.5. 5G
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
AI | Artificial Intelligence |
AVS | Antivirus Software |
BP | Back Propagation |
CSA | Cyber Situation Awareness |
DAE | Deep Autoencoder |
DNN | Deep Neural Network |
D-S | Dempster–Shafer |
FNN | Fuzzy Neural Network |
HMM | Hidden Markov Models |
IDS | Intrusion Detection Systems |
IoT | Internet of Things |
JDL | Joint Directors of Laboratories |
ML | Machine learning |
NSSA | Network Security Situation Awareness |
NSSP | Trusted Execution Environments |
RBF | Radial Basis Function |
RNN | Recurrent Neural Network |
SA | Situation Awareness |
SVM | Support Vector Machine |
WNN | Wavelet Neural Network |
References
- Zarei, S.M.; Fotohi, R. Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem. Secur. Priv. 2021, 4, e152. [Google Scholar] [CrossRef]
- Wu, S.; Guo, H.; Xu, J.; Zhu, S.; Wang, H. In-band full duplex wireless communications and networking for iot devices: Progress, challenges and opportunities. Future Gener. Comput. Syst. 2019, 92, 705–714. [Google Scholar] [CrossRef]
- Zhou, Z.; Tian, Y.; Xiong, J.; Ma, J.; Peng, C. Blockchain-enabled Secure and Trusted Federated Data Sharing in IIoT. IEEE Trans. Ind. Inform. 2022; Early Access. [Google Scholar] [CrossRef]
- Prvan, M.; Ožegović, J. Methods in Teaching Computer Networks: A Literature Review. ACM Trans. Comput. Educ. 2020, 20, 1–35. [Google Scholar] [CrossRef]
- Nour, B.; Mastorakis, S.; Ullah, R.; Stergiou, N. Information-Centric Networking in Wireless Environments: Security Risks and Challenges. IEEE Wirel. Commun. 2021, 28, 121–127. [Google Scholar] [CrossRef]
- Khan, R.; Asif, R. Reflective In-Band Full Duplex NOMA Communications for Secure 5G Networks. In Proceedings of the International Conference on Smart Applications, Communications and Networking, SmartNets 2021, Glasgow, UK, 22–24 September 2021; pp. 1–6. [Google Scholar]
- Wang, L.; Tian, Y.; Xiong, J. Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT. Digit. Commun. Netw. 2022, 8, 644–653. [Google Scholar] [CrossRef]
- Barak, I. Critical infrastructure under attack: Lessons from a honeypot. Netw. Secur. 2020, 2020, 16–17. [Google Scholar] [CrossRef]
- Aanjankumar, S.; Poonkuntran, S. An efficient soft computing approach for securing information over GAMEOVER Zeus Botnets with modified CPA algorithm. Soft Comput. 2020, 24, 16499–16507. [Google Scholar] [CrossRef]
- Mondal, A.; Das, A.K.; Nath, S.; Goswami, R.T. Review Study on Different Attack Strategies of Worm in a Network. Webology 2020, 17, 363–375. [Google Scholar] [CrossRef]
- Xosanavongsa, C. Heterogeneous Event Causal Dependency Definition for the Detection and Explanation of Multi-Step Attacks. Ph.D. Thesis, Centrale Supélec, Gif-sur-Yvette, France, 2020. [Google Scholar]
- Zhang, Y.; Zhang, J.; Zhang, B. Visual Analysis of Cybersecurity Situational Awareness. In Proceedings of the 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 18–20 October 2019; pp. 685–688. [Google Scholar]
- Chen, C.; Ye, L.; Yu, X.; Ding, B. A Survey of Network Security Situational Awareness Technology. In Proceedings of the International Conference on Artificial Intelligence and Security, New York, NY, USA, 26–28 July 2019; pp. 101–109. [Google Scholar]
- Gutzwiller, R.; Dykstra, J.; Payne, B. Gaps and Opportunities in Situational Awareness for Cybersecurity. In Digital Threats: Research and Practice; Association for Computing Machinery: New York, NY, USA, 2020; pp. 1–6. [Google Scholar]
- Zhang, D.; Qian, K.; Wang, W.; Fang, F.; Wang, C.; Luo, X. Network Security Situation Awareness Technology Based on Multi-source Heterogeneous Data. In Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, Guangzhou, China, 4–6 December 2020; pp. 420–424. [Google Scholar]
- Azhagiri, M.; Rajesh, A.; Karthik, S. A multi-perspective and multi-level analysis framework in network security situational awareness. Int. J. Comput. Netw. Commun. Secur. 2017, 5, 71. [Google Scholar]
- Li, J.; Yi, X.; Wei, S. A study of network security situational awareness in Internet of Things. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 1624–1629. [Google Scholar]
- Husák, M.; Jirsík, T.; Yang, S.J. SoK: Contemporary issues and challenges to enable cyber situational awareness for network security. In Proceedings of the 15th International Conference on Availability, Reliability and Security, Online, 25–28 August 2020; pp. 1–10. [Google Scholar]
- Franke, U.; Brynielsson, J. Cyber situational awareness–a systematic review of the literature. Comput. Secur. 2014, 46, 18–31. [Google Scholar] [CrossRef]
- Jiang, L.; Jayatilaka, A.; Nasim, M.; Grobler, M.; Zahedi, M.; Babar, M.A. Systematic Literature Review on Cyber Situational Awareness Visualizations. arXiv 2021, arXiv:2112.10354. [Google Scholar] [CrossRef]
- Li, Y.; Huang, G.Q.; Wang, C.Z.; Li, Y.C. Analysis framework of network security situational awareness and comparison of implementation methods. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 205. [Google Scholar] [CrossRef] [Green Version]
- Gong, J.; Zang, X.; Su, Q.; Hu, X.; Xu, J. Overview of Network security Situational Awareness. J. Softw. 2017, 28, 17. [Google Scholar]
- Jia, Y.; Han, W.; Yang, H. Research status and development trend of network security situational awareness. J. Guangzhou Univ. 2019, 18, 1–10. [Google Scholar]
- Husák, M.; Komárková, J.; Bou-Harb, E.; Čeleda, P. Survey of attack projection, prediction, and forecasting in cyber security. IEEE Commun. Surv. Tutor. 2018, 21, 640–660. [Google Scholar] [CrossRef] [Green Version]
- Endsley, M.R.; Garland, D.J. Situation Awareness Analysis and Measurement; CRC Press: Boca Raton, FL, USA, 2000. [Google Scholar]
- Endsley, M.R. Design and evaluation for situation awareness enhancement. In Proceedings of the Human Factors Society Annual Meeting, Anaheim, CA, USA, 24–28 October 1988; Sage Publications: Los Angeles, CA, USA, 1988; Volume 32, pp. 97–101. [Google Scholar]
- Bass, T.; Gruber, D. A glimpse into the future of id. Mag. Usenix Sage 1999, 24, 40–49. [Google Scholar]
- Chen, W.; Ao, Z.; Guo, J.; Yu, Q.; Tong, J. Research on cyberspace situation awareness security assessment based on improved BP neural network. Comput. Sci. 2018, 45, 335–337. [Google Scholar]
- Zhao, D.; Liu, J. Study on network security situation awareness based on particle swarm optimization algorithm. Comput. Ind. Eng. 2018, 125, 764–775. [Google Scholar] [CrossRef]
- Rongrong, X.; Xiaochun, Y.; Zhiyu, H. Framework for risk assessment in cyber situational awareness. IET Inf. Secur. 2019, 13, 149–156. [Google Scholar] [CrossRef]
- Ziems, N.; Wu, S. Security Vulnerability Detection Using Deep Learning Natural Language Processing. In Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Online, 2–5 May 2021; pp. 1–6. [Google Scholar]
- Endsley, M.R. Situation awareness global assessment technique (SAGAT). In Proceedings of the IEEE 1988 National Aerospace and Electronics Conference, Dayton, OH, USA, 23–27 May 1988; pp. 789–795. [Google Scholar]
- Giacobe, N.A. Application of the JDL data fusion process model for cyber security. In Proceedings of the Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications, Orlando, FL, USA, 7–8 April 2010; International Society for Optics and Photonics: Bellingham, WA, USA, 2010; Volume 7710, p. 77100R. [Google Scholar]
- Zhigang, A. Cyberspace Operations Situational Awareness’: ‘Cyberspace Operations: Mechanism and Planning; Publishing House of Electronics Industry: Beijing, China, 2018; p. 1. [Google Scholar]
- Bass, T. Intrusion detection systems and multisensor data fusion. Commun. ACM 2000, 43, 99–105. [Google Scholar] [CrossRef]
- Huiqiang, W.; Jibao, L.; Liang, Z.; Ying, L. Survey of Network Situation Awareness System. Comput. Sci. 2006, 33, 5–10. [Google Scholar]
- Jibao, L.; Huiqiang, W.; Shuang, J. Study of network security situation awareness system based on Netflow. Comput. Appl. Res. 2007, 24, 167–169. [Google Scholar]
- Yan, J.; Xiaowei, W.; Weihong, H.; Aiping, L.I.; Wencong, C. YHSSAS: Large-scale Network Oriented Security Situational Awareness System. Comput. Sci. 2011, 38, 4–8. [Google Scholar]
- An, J.; Li, X.; You, C.; Zhang, L. The research of cyber situation awareness model. In Proceedings of the International Conference on Intelligent and Interactive Systems and Applications, Shanghai, China, 25–26 June 2016; pp. 232–238. [Google Scholar]
- Kokkonen, T. Architecture for the cyber security situational awareness system. In Internet of Things, Smart Spaces, and Next Generation Networks and Systems; Springer: Berlin/Heidelberg, Germany, 2016; pp. 294–302. [Google Scholar]
- Evesti, A.; Kanstrén, T.; Frantti, T. Cybersecurity situational awareness taxonomy. In Proceedings of the 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), London, UK, 19–20 June 2017; pp. 1–8. [Google Scholar] [CrossRef]
- Vaarandi, R.; Pihelgas, M. Using security logs for collecting and reporting technical security metrics. In Proceedings of the 2014 IEEE Military Communications Conference, Washington, DC, USA, 6–8 October 2014; pp. 294–299. [Google Scholar]
- Jajodia, S.; Noel, S.; O’berry, B. Topological analysis of network attack vulnerability. In Managing Cyber Threats; Springer: Berlin/Heidelberg, Germany, 2005; pp. 247–266. [Google Scholar]
- Wang, L.; Singhal, A.; Jajodia, S. Toward measuring network security using attack graphs. In Proceedings of the 2007 ACM Workshop on Quality of Protection, Alexandria, VA, USA, 29 October 2007; pp. 49–54. [Google Scholar]
- Ning, P.; Cui, Y.; Reeves, D.S.; Xu, D. Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. (TISSEC) 2004, 7, 274–318. [Google Scholar] [CrossRef]
- Xu, D.; Ning, P. Alert correlation through triggering events and common resources. In Proceedings of the 20th Annual Computer Security Applications Conference, Washington, DC, USA, 6–10 December 2004; pp. 360–369. [Google Scholar]
- Barford, P.; Chen, Y.; Goyal, A.; Li, Z.; Paxson, V.; Yegneswaran, V. Employing honeynets for network situational awareness. In Cyber Situational Awareness; Springer: Berlin/Heidelberg, Germany, 2010; pp. 71–102. [Google Scholar]
- Juan, W.; Fengli, Z.; Chong, F.U.; Lisha, C. Study on index system in network situation awareness. Comput. Appl. 2007, 27, 1907–1909. [Google Scholar]
- Hailong, W.; Zhenghu, G. Heterogeneous multi-sensor information fusion model for botnet detection. In Proceedings of the 2010 International Conference on Intelligent Computation Technology and Automation, Changsha, China, 11–12 May 2010; Volume 2, pp. 428–431. [Google Scholar]
- Liu, X.; Wang, H.; Yu, J.; Cao, B.; Gao, Z. Network security situation awareness model based on multi-source fusion. Adv. Sci. Lett. 2012, 5, 775–779. [Google Scholar] [CrossRef]
- Heyi, W.; Aiqun, H.; Yubo, S.; Ning, B.; Xuefei, J. A new intrusion detection feature extraction method based on complex network theory. In Proceedings of the 2012 Fourth International Conference on Multimedia Information Networking and Security, Nanjing, China, 2–4 November 2012; pp. 852–856. [Google Scholar]
- Tsang, C.H.; Kwong, S. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In Proceedings of the 2005 IEEE international conference on industrial technology, Hong Kong, China, 14–17 December 2005; pp. 51–56. [Google Scholar]
- Lai, J.; Wang, H.; Zheng, F.; Feng, G. Network Security Situation Element Extraction Method based on DsimC and EWDS. Comput. Sci. 2010, 37, 64–69. [Google Scholar]
- Chang, Y.; Ma, Z.; Li, X.; Gong, D. Security situation element extraction based on probabilistic neural network. Cyberspace Secur. 2020, 11, 6. [Google Scholar]
- Li, B.; Pi, D.; Lin, Y.; Khan, I.A.; Cui, L. Multi-source information fusion based heterogeneous network embedding. Inf. Sci. 2020, 534, 53–71. [Google Scholar] [CrossRef]
- Jia, Y.; Fang, B. Network Security Situation Awareness; Publishing House of Electronics Industry: Beijing, China, 2020; p. 47. [Google Scholar]
- Lan, L.; Jun, L. Some special issues of network security monitoring on big data environments. In Proceedings of the 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, Chengdu, China, 21–22 December 2013; pp. 10–15. [Google Scholar]
- Wang, H.; Chen, Z.; Feng, X.; Di, X.; Liu, D.; Zhao, J.; Sui, X. Research on network security situation assessment and quantification method based on analytic hierarchy process. Wirel. Pers. Commun. 2018, 102, 1401–1420. [Google Scholar] [CrossRef]
- Zhang, J. Research on some key technologies of network security situation assessment. Ph.D. Thesis, National University of Defense Technology, Changsha, China, 2013. [Google Scholar]
- Zhang, H.; Kang, C.; Xiao, Y. Research on Network Security Situation Awareness Based on the LSTM-DT Model. Sensors 2021, 21, 4788. [Google Scholar] [CrossRef]
- Xiaolu, H.; Yun, L.; Zhenjiang, Z.; Xin, L.; Yang, L. Network Security Situation Awareness Theory and Technology Overview and Research on Difficult Issues. Inf. Secur. Commun. Confidentiality 2019, 61–71. [Google Scholar]
- Li, Y. Research on Network Security Situational Awareness Technology Based on Indicator System. Ph.D. Thesis, Tianjin University of Technology, Tianjin, China, 2016. [Google Scholar]
- Xiuzhen, C.; Qinghua, Z.; Xiaohong, G.; Chenguang, L. Quantitative Hierarchical Threat Evaluation Model for Network Security. J. Softw. 2006, 17, 885–897. [Google Scholar]
- Lai, J. Research on Several Key Technologies of Network Security Situational Awareness Based on Heterogeneous Sensors. Ph.D. Thesis, Harbin Engineering University, Harbin, China, 2009. [Google Scholar]
- Zhang, Y. Research and System Implementation of Network Security Situational Awareness Model. Ph.D. Thesis, University of Science and Technology of China, Hefei, China, 2010. [Google Scholar]
- Meng, J. Research on Key Technologies of Network Security Situation Assessment and Forecast. Ph.D. Thesis, Nanjing University of Science and Technology, Nanjing, China, 2012. [Google Scholar]
- Jia, Y.; Wu, H.; Jiang, D. A Hierarchical Framework of Security Situation Assessment for Information System. In Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Xi’an, China, 17–19 September 2015; pp. 23–28. [Google Scholar]
- Kong, D.; Li, H.; Dong, H. Research on Network Security Situation Assessment Technology Based on Fuzzy Evaluation Method. J. Phys. Conf. Ser. IOP 2021, 1883, 012108. [Google Scholar] [CrossRef]
- Alali, M.; Almogren, A.; Hassan, M.M.; Rassan, I.A.; Bhuiyan, M.Z.A. Improving risk assessment model of cyber security using fuzzy logic inference system. Comput. Secur. 2018, 74, 323–339. [Google Scholar] [CrossRef]
- Zhao, G.; Wang, H.; Wang, J. Research on survivability situation assessment of network based on grey relational analysis. Small Microcomput. Syst. 2006, 27, 4. [Google Scholar]
- Zhuo, Y.; He, M.; Gong, Z. Rough set analysis model for network situation assessment. Comput. Eng. Sci. 2012, 34, 1–5. [Google Scholar]
- Li, X.; Li, X.; Zhao, Z. Combining deep learning with rough set analysis: A model of cyberspace situational awareness. In Proceedings of the 2016 6th International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, China, 17–19 June 2016; pp. 182–185. [Google Scholar]
- Zhang, L.; Zhu, Y.; Shi, X.; Li, X. A situation assessment method with an improved fuzzy deep neural network for multiple UAVs. Information 2020, 11, 194. [Google Scholar] [CrossRef] [Green Version]
- Yang, H.; Zeng, R.; Xu, G.; Zhang, L. A network security situation assessment method based on adversarial deep learning. Appl. Soft Comput. 2021, 102, 107096. [Google Scholar] [CrossRef]
- Hossain, M.S.; Amin, S.U.; Alsulaiman, M.; Muhammad, G. Applying deep learning for epilepsy seizure detection and brain mapping visualization. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 2019, 15, 1–17. [Google Scholar] [CrossRef]
- Ahmad, K.; Mekhalfi, M.L.; Conci, N.; Melgani, F.; Natale, F.D. Ensemble of deep models for event recognition. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 2018, 14, 1–20. [Google Scholar] [CrossRef]
- Tian, Y.; Lee, G.H.; He, H.; Hsu, C.Y.; Katabi, D. RF-based fall monitoring using convolutional neural networks. Proc. ACM Interactive Mobile Wearable Ubiquitous Technol. 2018, 2, 1–24. [Google Scholar] [CrossRef]
- Zhang, Q.; Yang, L.T.; Chen, Z.; Li, P. Dependable deep computation model for feature learning on big data in cyber-physical systems. ACM Trans. Cyber-Phys. Syst. 2018, 3, 1–17. [Google Scholar] [CrossRef]
- Li, C.; Li, X.M. Cyber performance situation awareness on fuzzy correlation analysis. In Proceedings of the 2017 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, 13–16 December 2017; pp. 424–428. [Google Scholar]
- Wu, S.; Rendall, J.B.; Smith, M.J.; Zhu, S.; Xu, J.; Wang, H.; Yang, Q.; Qin, P. Survey on prediction algorithms in smart homes. IEEE Internet Things J. 2017, 4, 636–644. [Google Scholar] [CrossRef]
- Ebazadeh, Y.; Fotohi, R. A reliable and secure method for network-layer attack discovery and elimination in mobile ad-hoc networks based on a probabilistic threshold. Secur. Priv. 2022, 5, e183. [Google Scholar] [CrossRef]
- Wei, X.; Jiang, X. Comprehensive analysis of network security situational awareness methods and models. In Proceedings of the 2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA), Toronto, ON, Canada, 23–24 December 2013; pp. 176–179. [Google Scholar]
- Leau, Y.B.; Manickam, S. Network security situation prediction: A review and discussion. In Proceedings of the International Conference on Soft Computing, Intelligence Systems, and Information Technology, Chennai, India, 12–13 November 2015; pp. 424–435. [Google Scholar]
- Ioannou, G.; Louvieris, P.; Clewley, N. A Markov multi-phase transferable belief model for cyber situational awareness. IEEE Access 2019, 7, 39305–39320. [Google Scholar] [CrossRef]
- Abdlhamed, M.; Kifayat, K.; Shi, Q.; Hurst, W. A system for intrusion prediction in cloud computing. In Proceedings of the International Conference on Internet of Things and Cloud Computing, Dalian, China, 22–23 October 2016; pp. 1–9. [Google Scholar]
- Abdlhamed, M.; Kifayat, K.; Shi, Q.; Hurst, W. Intrusion prediction systems. In Information Fusion for Cyber-Security Analytics; Springer: Berlin/Heidelberg, Germany, 2017; pp. 155–174. [Google Scholar]
- Phillips, C.; Swiler, L.P. A graph-based system for network-vulnerability analysis. In Proceedings of the 1998 Workshop on New Security Paradigms, Charlottesville, VA, USA, 22–26 September 1998; pp. 71–79. [Google Scholar]
- Polatidis, N.; Pimenidis, E.; Pavlidis, M.; Papastergiou, S.; Mouratidis, H. From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks. Evol. Syst. 2018, 11, 479–490. [Google Scholar] [CrossRef] [Green Version]
- Huang, K.; Zhou, C.; Tian, Y.C.; Yang, S.; Qin, Y. Assessing the physical impact of cyberattacks on industrial cyber-physical systems. IEEE Trans. Ind. Electron. 2018, 65, 8153–8162. [Google Scholar] [CrossRef] [Green Version]
- Jing, S.; Li, M.; Sun, Y.; Zhang, Y. Research on Prediction of Attack Behavior Based on HMM. In Proceedings of the 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Chongqing, China, 18–20 June 2021; Volume 4, pp. 1580–1583. [Google Scholar]
- Liang, W.; Long, J.; Chen, Z.; Yan, X.; Li, Y.; Zhang, Q.; Li, K.C. A security situation prediction algorithm based on HMM in mobile network. Wirel. Commun. Mob. Comput. 2018, 2018, 5380481. [Google Scholar] [CrossRef]
- Rzepecki, Ł.; Jaśkowski, P. Application of game theory against nature in supporting bid pricing in construction. Symmetry 2021, 13, 132. [Google Scholar] [CrossRef]
- Wang, Y.; Li, W.; Liu, Y. A forecast method for network security situation based on fuzzy Markov chain. In Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-Centric Computing: HumanCom and EMC 2013; Springer: Berlin/Heidelberg, Germany, 2014; pp. 953–962. [Google Scholar]
- Lin, Z.; Chen, G.; Guo, W.; Liu, Y. PSO-BPNN-based prediction of network security situation. In Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, Dalian, China, 18–20 June 2008; p. 37. [Google Scholar]
- Tang, C.; Xie, Y.; Qiang, B.; Wang, X.; Zhang, R. Security situation prediction based on dynamic BP neural with covariance. Procedia Eng. 2011, 15, 3313–3317. [Google Scholar] [CrossRef] [Green Version]
- Zhang, R.; Liu, M.; Yin, Y.; Zhang, Q.; Cai, Z. Prediction Algorithm for Network Security Situation based on BP Neural Network Optimized by SA-SOA. Int. J. Perform. Eng. 2020, 16, 1171–1182. [Google Scholar]
- Zhang, Y.; He, C.; Wu, H. Network security situation prediction based on optimized BP neural network. In Proceedings of the 2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI), Changchun, China, 27–29 August 2021; pp. 682–686. [Google Scholar] [CrossRef]
- Zhang, H.; Huang, Q.; Li, F.; Zhu, J. A network security situation prediction model based on wavelet neural network with optimized parameters. Digit. Commun. Netw. 2016, 2, 139–144. [Google Scholar] [CrossRef] [Green Version]
- Ren, W.; Jiang, X.; Sun, Y. Network security situation prediction method based on RBF neural network. Comput. Eng. Appl. 2006, 42, 4. [Google Scholar]
- Jiang, Y.; Li, C.H.; Yu, L.S.; Bao, B. On network security situation prediction based on RBF neural network. In Proceedings of the 2017 36th Chinese Control Conference (CCC), Dalian, China, 26–28 July 2017; pp. 4060–4063. [Google Scholar]
- Feng, W.; Wu, Y.; Fan, Y. A new method for the prediction of network security situations based on recurrent neural network with gated recurrent unit. Int. J. Intell. Comput. Cybern. 2018, 13, 25–39. [Google Scholar] [CrossRef]
- Hu, J.; Ma, D.; Liu, C.; Shi, Z.; Yan, H.; Hu, C. Network security situation prediction based on MR-SVM. IEEE Access 2019, 7, 130937–130945. [Google Scholar] [CrossRef]
- Lu, H.; Zhang, G.; Shen, Y. Cyber security situation prediction model based on GWO-SVM. In Proceedings of the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Asan, Republic of Korea, 1–3 July 2019; pp. 162–171. [Google Scholar]
- Dong, Z.; Su, X.; Sun, L.; Xu, K. Network security situation prediction method based on strengthened LSTM neural network. J. Phys. Conf. Ser. IOP Publ. 2021, 1856, 012056. [Google Scholar] [CrossRef]
- Xue, R.; Tang, P.; Fang, S. Prediction of Computer Network Security Situation Based on Association Rules Mining. Wirel. Commun. Mob. Comput. 2022, 2022, 2794889. [Google Scholar] [CrossRef]
- Chen, L.; Zheng, M.; Liu, Z.; Chen, F.; Zhou, K.; Liu, B. SAE+ Bi-GRU Based Security Situation Prediction for Smart Grid. In Proceedings of the International Conference on Emerging Internetworking, Data & Web Technologies, Okayama, Japan, 2–4 March 2022; pp. 21–30. [Google Scholar]
- Lin, Z.; Yu, J.; Liu, S. The prediction of network security situation based on deep learning method. Int. J. Inf. Comput. Secur. 2021, 15, 386–399. [Google Scholar] [CrossRef]
- Jibao, L.; Huiqiang, W.; Liang, Z. Study of network security situation awareness model based on simple additive weight and grey theory. In Proceedings of the 2006 International Conference on Computational Intelligence and Security, Alexandria, VA, USA, 16–17 October 2006; Volume 2, pp. 1545–1548. [Google Scholar]
- Zhang, F.; Wang, J.; Qin, Z. Using gray model for the evaluation index and forecast of network security situation. In Proceedings of the 2009 International Conference on Communications, Circuits and Systems, Milpitas, CA, USA, 23–25 July 2009; pp. 309–313. [Google Scholar]
- Deng, Y.; Wen, Z.; Jiang, X. Network Security Situation Prediction Method Based on Grey Theory. J. Hunan Univ. Technol. 2015, 29, 5. [Google Scholar]
- Chen, G. Multimedia Security Situation Prediction Based on Optimization of Radial Basis Function Neural Network Algorithm. Comput. Intell. Neurosci. 2022, 2022, 6314262. [Google Scholar] [CrossRef] [PubMed]
- Chen, Z. Research on Internet Security Situation Awareness Prediction Technology based on Improved RBF Neural Network Algorithm. J. Comput. Cogn. Eng. 2022, 1, 103–108. [Google Scholar]
- Maintz, S.; Deringer, V.L.; Tchougréeff, A.L.; Dronskowski, R. LOBSTER: A tool to extract chemical bonding from plane-wave based DFT. J. Comput. Chem. 2016, 37, 1030–1035. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Qian, W.; Lai, H.; Zhu, Q.; Chang, K.C. Overview of network security situation awareness based on big data. In Proceedings of the International Conference on Advanced Machine Learning Technologies and Applications, Cairo, Egypt, 20–22 March 2021; pp. 875–883. [Google Scholar]
- Zhu, B.; Chen, Y.; Cai, Y. Three Kinds of Network Security Situation Awareness Model Based on Big Data. Int. J. Netw. Secur. 2019, 21, 115–121. [Google Scholar]
- Wu, J.; Ota, K.; Dong, M.; Li, J.; Wang, H. Big Data Analysis-Based Security Situational Awareness for Smart Grid. IEEE Trans. Big Data 2018, 4, 408–417. [Google Scholar] [CrossRef] [Green Version]
- Chandarana, P.; Vijayalakshmi, M. Big data analytics frameworks. In Proceedings of the 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA), Mumbai, India, 4–5 April 2014; pp. 430–434. [Google Scholar]
- Fischer, F.; Keim, D.A. NStreamAware: Real-time visual analytics for data streams to enhance situational awareness. In Proceedings of the Eleventh Workshop on Visualization for Cyber Security, Paris, France, 10 November 2014; pp. 65–72. [Google Scholar]
- Chen, X.; Zeng, X.; Wang, W. Big data analytics for network security and intelligence. Adv. Eng. Sci. 2017, 39, 112–129. [Google Scholar]
- Shao, S.; Satam, P.; Satam, S.; Al-Awady, K.; Ditzler, G.; Hariri, S.; Tunc, C. Multi-Layer Mapping of Cyberspace for Intrusion Detection. In Proceedings of the 2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA), Tangier, Morocco, 30 November–3 December 2021; pp. 1–8. [Google Scholar]
- Gao, C.; Guo, Q.; Jiang, D.; Wang, Z.; Fang, C.; Hao, M. The theoretical basis and technical path of cyberspace geography. J. Geogr. Sci. 2019, 29, 5–20. [Google Scholar]
- Zhang, Z.; Ning, H.; Shi, F.; Farha, F.; Xu, Y.; Xu, J.; Zhang, F.; Choo, K.K.R. Artificial intelligence in cyber security: Research advances, challenges, and opportunities. Artif. Intell. Rev. 2021, 55, 1029–1053. [Google Scholar] [CrossRef]
- Xiaofei, Z.; Daoyin, Z.; Luolin, Z.; Decheng, C.; Rong, F. Research on Power Information Network Security Situation Awareness Based on LDA-RBF. Low Volt. Appar. 2021, 8, 16–23. [Google Scholar]
- Su, J.; Vargas, D.V.; Sakurai, K. One pixel attack for fooling deep neural networks. IEEE Trans. Evol. Comput. 2019, 23, 828–841. [Google Scholar] [CrossRef] [Green Version]
- Kolosnjaji, B.; Demontis, A.; Biggio, B.; Maiorca, D.; Giacinto, G.; Eckert, C.; Roli, F. Adversarial malware binaries: Evading deep learning for malware detection in executables. In Proceedings of the 2018 26th European Signal Processing Conference (EUSIPCO), Rome, Italy, 3–7 September 2018; pp. 533–537. [Google Scholar]
- Zhang, T.; Wang, S.; Li, G.; Liu, F.; Zhu, G.; Wang, R. Accelerating edge intelligence via integrated sensing and communication. In Proceedings of the ICC 2022-IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 1586–1592. [Google Scholar]
- Giles, K.; Hagestad, W. Divided by a common language: Cyber definitions in Chinese, Russian and English. In Proceedings of the 2013 5th International Conference on Cyber Conflict (CYCON 2013), Tallinn, Estonia, 4–7 June 2013; pp. 1–17. [Google Scholar]
- Tamassia, R.; Palazzi, B.; Papamanthou, C. Graph drawing for security visualization. In Proceedings of the International Symposium on Graph Drawing, Crete, Greece, 21–24 September 2008; pp. 2–13. [Google Scholar]
- Beaver, J.M.; Steed, C.A.; Patton, R.M.; Cui, X.; Schultz, M. Visualization techniques for computer network defense. In Proceedings of the Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense X, Orlando, FL, USA, 15–17 April 2011; SPIE: Bellingham, WA, USA, 2011; Volume 8019, pp. 18–26. [Google Scholar]
- Sharma, S.; Bodempudi, S.T.; Reehl, A. Real-Time Data Visualization to Enhance Situational Awareness of COVID pandemic. In Proceedings of the 2020 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 16–18 December 2020; pp. 352–357. [Google Scholar]
- Zaminkar, M.; Fotohi, R. SoS-RPL: Securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism. Wirel. Pers. Commun. 2020, 114, 1287–1312. [Google Scholar] [CrossRef]
- Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions. IEEE Commun. Surv. Tutor. 2020, 22, 196–248. [Google Scholar] [CrossRef] [Green Version]
- Khan, R.; Tsiga, N.; Asif, R. Interference management with reflective in-band full-duplex NOMA for secure 6G wireless communication systems. Sensors 2022, 22, 2508. [Google Scholar] [CrossRef] [PubMed]
- Khan, R.; Jayakody, D.N.K. Full Duplex Component-Forward Cooperative Communication for a Secure Wireless Communication System. Electronics 2020, 9, 2102. [Google Scholar] [CrossRef]
Related Works | Key Contributions | Limitations |
---|---|---|
[18] | A survey on concept and review of research on cyber situation awareness (CSA) | The applications have not been presented. |
[19] | A review of CSA, based on systematic queries in four leading scientific databases | The paper only analyzes the research agenda in the area of CSA. |
[20] | A survey on the scientific literature on CSA visualizations | The paper only focuses on visualizations. |
[21] | A survey on the analysis framework of Network Security Situation Awareness (NSSA) and comparison of implementation methods | The use of NSSA and applications have not been presented. |
[22] | A systematic explanation for the definition of NSSA and the understanding of the basic concept | The paper only focuses on discussing the concept and the framework of NSSA. |
[23] | A survey on concept, structure and the key technology of NSSA | The analysis of NSSA technologies is limited. Moreover, discussions for use cases are lacking. |
[24] | A survey of forecasting methods for NSSA | The paper only focuses on prediction of NSSA, comprehension and assessment are not considered. |
Our paper | An extensive survey on the NSSA integration. First, we extensively discuss the concept and the history of NSSA in network security. Second, the critical research works of NSSA technology are also analyzed in detail, including technical classification, technical characteristics, strengths and weaknesses. Third, the classic use cases of NSSA are provided at the national level. Finally, research challenges and directions are also highlighted. |
Ref. | Description | Approach | Strengths | Weaknesses |
---|---|---|---|---|
[43,44] | Obtain vulnerability information | Topological vulnerability analysis (TVA)/attack graphs | Low evaluation difficulty and high evaluation efficiency | The overall security situation cannot be obtained |
[45,46] | Obtain alarm information | Intrusion Detection Systems (IDS) /correlation analysis | Low evaluation difficulty and high evaluation efficiency | The overall security situation cannot be obtained |
[47] | Obtain attack information | Honeynets | Low evaluation difficulty and high evaluation efficiency | The overall security situation cannot be obtained |
[48] | Obtain multi-source information security data | Index system | Perceive the overall network security situation | High evaluation difficulty and low evaluation efficiency |
[49] | Obtain the complex network security information | Botnet detection technology | Perceive the whole network security situation | High time complexity |
[50,51,52,53] | Obtain multi-source data and information | Multi-source fusion | Perceive the overall network security situation | Reduce the extraction efficiency |
[54] | Extract the situation element from multi-source information | Probabilistic neural network | Reduce the system complexity | High time complexity |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, J.; Feng, H.; Liu, B.; Zhao, D. Survey of Technology in Network Security Situation Awareness. Sensors 2023, 23, 2608. https://doi.org/10.3390/s23052608
Zhang J, Feng H, Liu B, Zhao D. Survey of Technology in Network Security Situation Awareness. Sensors. 2023; 23(5):2608. https://doi.org/10.3390/s23052608
Chicago/Turabian StyleZhang, Junwei, Huamin Feng, Biao Liu, and Dongmei Zhao. 2023. "Survey of Technology in Network Security Situation Awareness" Sensors 23, no. 5: 2608. https://doi.org/10.3390/s23052608
APA StyleZhang, J., Feng, H., Liu, B., & Zhao, D. (2023). Survey of Technology in Network Security Situation Awareness. Sensors, 23(5), 2608. https://doi.org/10.3390/s23052608