Journal of Northeastern University ›› 2005, Vol. 26 ›› Issue (3): 228-231.DOI: -

• OriginalPaper • Previous Articles     Next Articles

Network security information fusion based security event analysis and prediction model

Peng, Xue-Na (1); Zhao, Hong (1)   

  1. (1) Software Ctr., Northeastern Univ., Shenyang 110004, China
  • Received:2013-06-24 Revised:2013-06-24 Online:2005-03-15 Published:2013-06-24
  • Contact: Peng, X.-N.
  • About author:-
  • Supported by:
    -

Abstract: A model is developed fusing all network security information together for analyzing and predicting security events to meet the requirements of network security management. The model can verify, aggregate and correlate with the network security information that comes mainly from IDSes, with the rest from various security devices and the log systems of key hosts. The model can also evaluate the security status of the target network according to network security mission, and analyze the key threat to the network. Besides, it can predict possible security event in future according to a certain attack scenario and realize the latent threat as soon as possible, which means winning valuable time for effective response.

CLC Number: