Uniform Comparison Approach for Different Network security Assessment Using HRCAL Method

Authors

  • Patil A Research Scholar, Dept. of CSE, SVITS, Indore, (M.P), India
  • Prakash V Associate Prof., Dept. of CSE, SVITS, Indore (M.P), India

Keywords:

Situation Awareness (SAM), Vulnerability, Attack Graphs, Network Configuration Metrics, HRCAL (Host, Route, Configuration and Attack Level Analysis)

Abstract

Network security the field of network security is very dynamic, and highly technical field dealing with all aspects of scanning, hacking and securing system against intrusion. And we know that today’s the attacks on internet is major issue, today’s world of technology the fault security is becoming an almost incurable problem in today’s network. For these attacks Here we provide the situation awareness mechanism to know about the situation of network and let them aware from situation of network. In my previous work, I had provided the situation awareness mechanism that gather the network actual condition and clearly define the boundaries by which security solution can be made and I had also gone to detect network condition and draw the graphs with the help of security metrics. In this paper I am going to compared my proposed work with other work.

References

Rongrong Xi, Shuyuan Jin, Xiaochun Yun and Yongzheng Zhang, “CNSSA: A Comprehensive Network Security Situation Awareness System”, in International Joint Conference of IEEE TrustCom, ISSN: 978-0-7695-4600-1/11, doi: 10.1109/TrustCom.2011.62, 2011.

Yu Dong and Frincke, D. , "Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster-Shafer Theory, " 43rd ACM Southeast Conference, March 18-20, 2005.

Rongzhen FAN, Mingkuai ZHOU, “Network Security Awareness and Tracking Method by GT”, in Journal of Computational Information Systems, Binary Information Press, ISSN: 1043-1050, Vol. 9: Issue 3, 2013.

Igor Kotenko and Andrew Chechulim, “Attack Modelling and Security Evaluation in SIEM System”, in International Transaction of System Science and Application, SIWN Press,, ISSN:2051-5642, Vol. 8, Dec 2012.

Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, and Sushil Jajodia, “An Attack Graph-Based Probabilistic Security Metric”, in National Institute of Standards and Technology Computer Security Division; Concordia Institute for Information Systems Engineering, Montreal, Canada.

Marianne Swanson, Nadya Bartol, John Sabato, Joan Hash, and Laurie Graffo, “Security Metrics Guide for Information Technology Systems”, in NIST Special Publication 800-55, July 2003.

Pallavi Vaidya and S. K. Shinde, “Application for Network Security Situation Awareness”, in International Conference in Recent Trends in Information Technology and Computer Science (ICRTITCS - 2012), IJCA, ISSN: 0975 – 8887, 2012.

Ankita Patil, Vijay Prakash “A Novel Framework for Composite Network Security Situation Assessment Using HRCAL Approach” international journals of Engineering Science Research and Technology. Jun 10, 2014.

Ankita Patil, Vijay Prakash “Performance Evaluation of Composite Network Security Situation Assessment Using HRCAL” international journals of Research in Computer Engineering and Electronics. Dec 26, 2014.

Downloads

Published

2024-02-26

How to Cite

Patil, A., & Prakash, V. (2024). Uniform Comparison Approach for Different Network security Assessment Using HRCAL Method. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(01), 1472–1476. Retrieved from https://ijact.in/index.php/j/article/view/255

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.