Skip to main content

Survey of Network Security Situation Awareness and Key Technologies

  • Conference paper
  • First Online:
Frontier and Future Development of Information Technology in Medicine and Education

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 269))

Abstract

Network Security Situation Awareness (NSSA) can significantly improve the monitoring and emergency response capability of the network. It’s important to predict the network security trend. In this paper, we described the key technologies of NSSA, and then we discussed the advantages and disadvantages of the various algorithms of network security situation assessment and predict. Finally, we summary the problems of network security situational awareness, and analyzed the future direction of development and trends.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 429.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 549.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Endsley MR (1988) Design and evaluation for situation awareness enhancement [C]. In: Proceeding of the 32nd human factors society annual meeting.Human Factors and Ergonomics Society, Santa Monica, pp 97–101

    Google Scholar 

  2. Zhuo Y (2010) Research of situational awareness based on the network topology and traffic mining [D]. National Defense Science and Technology University

    Google Scholar 

  3. Gad A, Farooq M (2002) Data fusion architecture for maritime surveillance. In: Proceedings of the international society on information fusion (ISIF), pp. 448–455. http://www.isif.org/fusion/procecdings/fusion02CD/pdffiles/papers/M4D03.pdf

  4. Kadar I (2005) Knowledge representation issues in perceptual reasoning managed situation assessment. In: Proceedings of the FUSION, pp. 13–15. http://ieeexplore.ieee.org

  5. Wang L, Singhal A, Jajodia S (2007) Measuring network security using attack graphs[C]. In: Proceedings of the 2007 ACM workshop on quality of protection. ACM Press, New York, pp 49–54

    Google Scholar 

  6. Barford P, Chen Y, Goyal A et al (2005) Employing honey nets for network situational awareness [C]. In: Proceedings of the fourth workshop on hot topics in networks. Springer, Berlin, pp 71–102

    Google Scholar 

  7. Wang J (2010) Research on Key technology in large-scale network security situation awareness [D]. University of Electronic Science and Technology of China

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhang Xuan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Xuan, Z. (2014). Survey of Network Security Situation Awareness and Key Technologies. In: Li, S., Jin, Q., Jiang, X., Park, J. (eds) Frontier and Future Development of Information Technology in Medicine and Education. Lecture Notes in Electrical Engineering, vol 269. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-7618-0_423

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-7618-0_423

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-7617-3

  • Online ISBN: 978-94-007-7618-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics