• DocumentCode
    2860035
  • Title

    Network Threat Assessment Based on Alert Verification

  • Author

    Rongrong Xi ; Xiaochun Yun ; Jin, Shuyuan ; Zhang, Yongzheng

  • Author_Institution
    Inst. of Comput. Technol., Beijing, China
  • fYear
    2011
  • fDate
    20-22 Oct. 2011
  • Firstpage
    30
  • Lastpage
    34
  • Abstract
    In face of overwhelming alerts produced by firewalls or intrusion detection devices, it is difficult to assess network threats that we face. In this paper, we propose a threat assessment approach to estimate the impact of attacks on network. The approach employs the Common Vulnerability Scoring System to quantitatively assess network threats and further correlates alerts with contextual information to improve the accuracy of assessment. In the case studies, we demonstrate how the approach is applied in real networks. The experimental results show that the approach can make an accurate assessment of network threats.
  • Keywords
    authorisation; computer network security; alert verification; common vulnerability scoring system; firewalls; intrusion detection devices; network threat assessment; Computers; Databases; Intrusion detection; Network topology; Probes; Sensors; alert verification; quantitative assessment; threat assessment;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Parallel and Distributed Computing, Applications and Technologies (PDCAT), 2011 12th International Conference on
  • Conference_Location
    Gwangju
  • Print_ISBN
    978-1-4577-1807-6
  • Type

    conf

  • DOI
    10.1109/PDCAT.2011.57
  • Filename
    6118526