<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Distributed Security Situation Evaluation Model for Global Network</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Weiwei Zhang</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>School of Cyber-Physical Systems and Control, Peter the Great St. Petersburg Polytechnic University</institution>
          ,
          <addr-line>RUSSIA, St. Petersburg, 29</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <fpage>1</fpage>
      <lpage>3</lpage>
      <abstract>
        <p>Global network security assessment under distributed environment is extremely urgent. We try to design a distributed security situation quantitative evaluation model, and simulate the distributed security evaluation of the service subnet by building the LAN experimental platform. The result shows that this model has high practical value for vulnerability and attack means analysis of global network.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>With the rapid growth of global trade, more and more
economic investment has flowed into Central and Eastern
Europe and the BRICS countries. Multinational corporations
have set up branches or joint venture companies in these areas,
which has also brought about certain cyber security risks while
helping local governments increase the income and improve
the employment rates. Large international groups and R&amp;D
institutions have a wide range of branch offices, as well as a
complex network environment and ragged levels of security
policies, so they tend to be targeted by hacking organizations.
How to conduct a security assessment of a company's network
from a global perspective is crucial for setting up an effective
security strategy in the next step.</p>
      <p>As J. McCumber said [1], the evolution of cybersecurity
assessment method has gone from an artificial, local, single
stage to an automated, global, and widely distributed situation.
It is particularly noteworthy that the security of a host in a
network depends not only on its own security status, but also
the security of other ones in the global network. Therefore,
assessing from the entire network is of great significance for
discovering weaknesses in global network. F.B. Shaikh, and S.
Haider [2], after analyzing the security threats of cloud
computing, believe that the identification and analysis of
distributed vulnerability are very important in the global
environment, especially big data and cloud platform.
Vulnerability is the direct premise of the security threat. No
matter how advanced the attacker uses, if the protected assets
have no weakness or only a slight vulnerability, it is difficult
for the attackers to make use of their tools to damage assets
[3,4,5]. Therefore, by identifying and analyzing the loopholes
and security conditions of the services running on the network
system, it is helpful to improve the level of network security
protection and provide effective support measures for the
integrated security management of the system.</p>
      <p>However, the development of efficiency and security issues
are often a pair of brothers who go hand in hand, and the whole
is usually not a simple sum of parts. With the rapid
development of the Internet in today's information society,
cross-domain collaboration and sharing between different
branches of enterprises have become necessary tools for
enterprises to improve their competitiveness and expansion
[6]. Undoubtedly, this will expand the company's own
virtualized network boundaries, making it easier for attackers
to exploit various security vulnerabilities to implement
distributed [7], springboard attacks, or to achieve successful
intrusion through application layer trust relationships between
security domains [8]. Therefore, the security problem of
distributed systems is not a synthesis of the security problems
of distributed nodes. Local intrusion detection and auditing are
not enough to deal with the security threats brought about by
the virtualization of the organizational structure [9]. The
security policies between subsystems cannot be simply added.
It is difficult to implement uniform security standards in
different branches. From the perspective of the global network,
different branches often combine into different subnets
because of the need for information exchange. Subnets also
need to interact with the outside world, such as the CRM
system we are familiar with. Sales consultants need to be
allowed to access the company's CRM system and get
analytical support to conduct business with customer
companies. Because this process takes place outside the
company and lacks strong supervision, the service port of the
system network can easily be abused or even hacked during
this process. It can be said that the cross-domain collaboration
and sharing between enterprises has raised higher and more
specific requirements for enterprise security assessment and
protection.</p>
      <p>Therefore, it is necessary to analyze the problems of the
existing network security assessment methods based on the
actual needs of cross-domain situation, and design a
distributed network security situation assessment model.</p>
    </sec>
    <sec id="sec-2">
      <title>II. THEORETICAL ANALYSIS</title>
      <p>Under the actual demand of cross domain sharing,
collaboration and defense of enterprise network, the existing
network security assessment methods are faced with the
following difficult problems:</p>
      <p>1) The assessment of the security threat status of the
network system usually focuses on the impact of the attack in
a single network domain [10], which is difficult to reflect the
global security threat situation, and is not conducive to the
formulation and correction of the system security strategy.</p>
      <p>2) When the enterprise has multiple different branches, in
order to realize the security assessment of the business system
from the whole point of view, the estimated business network
inevitably transfers private data to other sub network
participating in the evaluation of the business, and this has
medium, and high. Table I is a partial attack category extracted
from the SNORT user manual and its corresponding severity.
of alarms, and the severity of security threats, we try to design
a quantitative assessment model.</p>
      <p>
        We use the centralized service security index   
to start
the derivation of the model framework. Security index for
service   in network m refers to the evaluation index of the
losses caused by the intrusion using the vulnerable points.
is derived from the importance of the service, the number
on the service   , and the severity of the
attack   . Based on the analysis method of literature [12],
according to the characteristics of service operation in the
network system, the importance of the service  
measured by the normal access of the system service in
is
different time periods. Eq. (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) gives the calculation method for
the service security index   
of the network m:
  
 =1
 
 
 =1
      </p>
      <p>10   
 
=</p>
      <p>∑ℎ=1</p>
    </sec>
    <sec id="sec-3">
      <title>2) Number of attacks</title>
      <p>attack event types i ( ∈</p>
      <p>[1,   ],</p>
      <p>We define the total number of types of services running in
network m as   , count the number of alarms for different
is the total number of
attack types for the corresponding service) of service   ( ∈
[1,   ]) according to the alarm data set generated by the IDS
in the network. After generating the number of alarms, we can
get  
3)</p>
      <p>.</p>
    </sec>
    <sec id="sec-4">
      <title>Security threat severity</title>
      <p>After setting service  
of attacks i with severity  
which suffers from different types
during time period ∆ , we use

the attack classification and prioritization of the SNORT user
manual [13] to determine the threat severity of each attack.
Respectively, 1, 2, and 3 indicate the three severity levels: low,
More explanations for the formula:
1)</p>
    </sec>
    <sec id="sec-5">
      <title>Normal access</title>
      <p>The number of normal access  
about service   varies
of 0:00-8:00, ∆ 2
from time to time during different time periods. Therefore, the
same attack event has different influences and losses on
services during different time periods. We can define the
number of divided periods h=3, and divide the time of the day
into three periods: ∆ 1=Night, which represents the time range
=OfficeHour describes 8:00-18:00, and
 
∆ 3=Evening indicates the time interval from 18:00 to 24:00.</p>
      <p>
        is assigned by the system administrator according to the
normal average visit amount  
(  ∈
[1 … ℎ] ) of the
service   in each period of the network m. The visit amount
is represented by 1, 2, 3, 4, and 5 respectively: very low, low,
medium, high, very high. The larger the value, the greater the
average traffic. Then, we will obtain  
in Eq. (
        <xref ref-type="bibr" rid="ref2 ref5">2</xref>
        ):
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2 ref5">2</xref>
        )
      </p>
      <p>Attack category</p>
      <sec id="sec-5-1">
        <title>Attemptedadmin Shellcode-detect</title>
      </sec>
      <sec id="sec-5-2">
        <title>Successfuladmin Attempted-dos Attempted-recon</title>
        <p>Network-scan</p>
      </sec>
      <sec id="sec-5-3">
        <title>String-detect</title>
      </sec>
      <sec id="sec-5-4">
        <title>Attempted-user Trojan-activity</title>
      </sec>
      <sec id="sec-5-5">
        <title>Misc-attack</title>
        <p>Suspicious-login</p>
      </sec>
      <sec id="sec-5-6">
        <title>Unknown Icmp-event</title>
      </sec>
      <sec id="sec-5-7">
        <title>Attempt to obtain administrator privileges</title>
      </sec>
      <sec id="sec-5-8">
        <title>Executable code detected</title>
      </sec>
      <sec id="sec-5-9">
        <title>Successfully acquired</title>
        <p>administrator rights</p>
      </sec>
      <sec id="sec-5-10">
        <title>Attempt to cause a denial of service</title>
      </sec>
      <sec id="sec-5-11">
        <title>Attempt to cause</title>
      </sec>
      <sec id="sec-5-12">
        <title>Information disclosure</title>
      </sec>
      <sec id="sec-5-13">
        <title>Detected Network scan</title>
      </sec>
      <sec id="sec-5-14">
        <title>Detected Suspicious string</title>
      </sec>
      <sec id="sec-5-15">
        <title>Attempt to obtain User</title>
      </sec>
      <sec id="sec-5-16">
        <title>Rights</title>
      </sec>
      <sec id="sec-5-17">
        <title>Detected Internet Trojan</title>
      </sec>
      <sec id="sec-5-18">
        <title>Rights</title>
      </sec>
      <sec id="sec-5-19">
        <title>Mixed attack</title>
      </sec>
      <sec id="sec-5-20">
        <title>Suspicious user login</title>
      </sec>
      <sec id="sec-5-21">
        <title>Unknown traffic</title>
      </sec>
      <sec id="sec-5-22">
        <title>General ICMP events</title>
      </sec>
      <sec id="sec-5-23">
        <title>High</title>
      </sec>
      <sec id="sec-5-24">
        <title>High</title>
      </sec>
      <sec id="sec-5-25">
        <title>High</title>
      </sec>
      <sec id="sec-5-26">
        <title>Medium</title>
      </sec>
      <sec id="sec-5-27">
        <title>Medium Low Low</title>
      </sec>
      <sec id="sec-5-28">
        <title>High</title>
      </sec>
      <sec id="sec-5-29">
        <title>High</title>
      </sec>
      <sec id="sec-5-30">
        <title>High</title>
      </sec>
      <sec id="sec-5-31">
        <title>Medium</title>
      </sec>
      <sec id="sec-5-32">
        <title>Medium</title>
        <p>Low
Low
Successful-user</p>
      </sec>
      <sec id="sec-5-33">
        <title>Successfully acquired User</title>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>III. MODEL DESIGN</title>
      <p>index   
result.</p>
      <p>Expanding to a distributed environment, we assume that l (l
≥</p>
      <p>3) service subnets participate in the overall security
assessment analysis, and there is no trusted third-party
computing provider. Based on the historical alarm information
collected by these subnets, the overall network service security
can be calculated statistically. Because each
evaluation participant has similar network services, by sharing
the attack conditions of each service in its own network
environment, under the distributed service assessment model,
it obtains a more general and global security situation analysis</p>
      <p>Suppose that the time division of the parties involved in the
assessment is the same (day time is divided into three time
periods: Night, Office Hour, and Evening), the same type of
attack has the same security threat severity, and the total
number of types of services running in the overall network is
 ( ≤</p>
      <p>∑</p>
      <p>=1   ). If the m-th party ( ∈
have an attack on a certain service type, the corresponding
[1 …  ]) does not
service  
= 0. According to their respective IDS alarm
data sets, the parties count the   
by sharing the service security index   
value of the entire network
in their respective
networks, so that we can get a globalized security posture
result. The calculation method of the overall network service
security index</p>
      <p>
        is shown in Eq. (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ):
   =

 =1
  
 =1
 
assessment model (Fig.1) for distributed security posture.
service security index    , the higher the degree of security
threat caused by exploiting the vulnerability of service   ,
which should be highly valued and prevented. Moreover,   
also describes the security threat values for successive periods
of time. The security threat trend of service   can be derived
Ⅳ. MODEL CONSTRAINTS
      </p>
      <p>In the process of computing the distributed security
assessment, in order to statistics the multi-party analysis data,
the participants will inevitably transfer the private data to other
participants to complete the distributed statistical process,
resulting in privacy problems.   
describes an intrusion
event that exploits the vulnerability of service   to attack a
system. Therefore, network service information that is running
or open in a network system is sensitive privacy information.
The leakage of this kind of information may lead to the leakage
and utilization of the system vulnerability information, which
seriously affects the security of the service network.</p>
      <p>At the same time, each business network participating in the
evaluation needs to interact ( − 1) × 
times, when there
are more participants or more types of services, the number of
interactions will increase linearly.</p>
      <p>Ⅴ. MODEL VALIDATION</p>
      <p>In order to verify the effectiveness of the proposed model in
quantitative assessment of distributed security posture, we set
up a LAN environment as an experimental platform to
simulate the scenario of distributed comprehensive security
assessment for three business subnets (l = 3). Each subnet
shares a class C address to connect to the Internet. Effective
attacks on servers in each subnet are performed using intrusion
methods such as buffer overflow and denial of service (DoS)
attacks. In the experimental platform, the overall network
service type number d = 5. SNORT is deployed on each server
in the subnet, and the alarm information generated by it is used
as the data source for security assessment. The network
services running on the three subnets, as well as the distributed
comprehensive service security index obtained from the
statistics of one day's data, are shown in Table 2.
Net</p>
      <p>Service
A
B
C</p>
      <p>
        FTP
MAIL
DNS
MAIL
FTP
WWW
TELNET (
        <xref ref-type="bibr" rid="ref1 ref1 ref2 ref5">1,2,1</xref>
        )
      </p>
      <p>Service
Importance
(  1,   2,</p>
      <p>
        3)
(
        <xref ref-type="bibr" rid="ref1 ref3 ref4">1,4,3</xref>
        )
(
        <xref ref-type="bibr" rid="ref2 ref4 ref5 ref6">2,5,4</xref>
        )
(
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref5">1,3,2</xref>
        )
(
        <xref ref-type="bibr" rid="ref1 ref3 ref3">1,3,3</xref>
        )
(
        <xref ref-type="bibr" rid="ref1 ref1 ref2 ref5">1,2,1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2 ref4 ref5 ref6">4,2,5</xref>
        )
      </p>
      <sec id="sec-6-1">
        <title>Service</title>
      </sec>
      <sec id="sec-6-2">
        <title>Importance Weights (3 periods)</title>
        <p>1   2,   3
(0.125,0.5,0.375)
(0.182,0.455,0.364)
(0.167,0.5,0.333)
(0.25,0.5,0.25)
(0.143,0.429,0.429)
(0.25,0.5,0.25)
(0.364,0.182,0.455)
(0.333,0.333,0.333)</p>
      </sec>
      <sec id="sec-6-3">
        <title>Distributed</title>
      </sec>
      <sec id="sec-6-4">
        <title>Integrated</title>
      </sec>
      <sec id="sec-6-5">
        <title>Service</title>
      </sec>
      <sec id="sec-6-6">
        <title>Security Index</title>
        <p>= 647.5
 
= 565
  
= 337.6
 
= 419.2
 
= 863
security threat posture map provides intuitive and quantitative
data for the overall network security assessment. This method
has high practical value for analyzing vulnerability, attack
behavior and means of the whole network.</p>
        <p>The parameters in the index are set in days. If the production
system environment equipment is excellent, it is recommended
that the enterprise security personnel set hours or even
minutes.</p>
        <p>Ⅵ. CONCLUSION</p>
        <p>In order to solve the problem that it is difficult to use the
massive and complex alarm information in the field of security
assessment to effectively model the overall security situation,
we combined the importance of services, the frequency of
alarms, the level of security threats, and other factors, studied
and proposed a distributed security quantitative assessment
model, and verified the model at the same time based on
massive alarm information. The results show that this model
can perform distributed quantitative assessment under the
condition of global security threats.</p>
        <p>Secure distributed statistical model is a key issue for
implementing network security assessment models in
peer-topeer environments. In the next research, we will try to analyze
the privacy issues in distributed assessment, establish a
distributed statistical model under the protection of privacy,
and combine with different security assessment methods to
support a wider range of application scenarios. Random
number distribution and sane path methods are worth
considering.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>McCumber</surname>
          </string-name>
          ,
          <article-title>" Assessing and Managing Security Risk in IT Systems: A Structured Methodology"</article-title>
          ,
          <source>IEEE Trans. CRC Press</source>
          , pp.
          <fpage>87</fpage>
          -
          <lpage>101</lpage>
          , Apr.
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>F.B.</given-names>
            <surname>Shaikh</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Haider</surname>
          </string-name>
          ,
          <article-title>" Security threats in cloud computing"</article-title>
          ,
          <source>ICITST</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Raghavendra</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.B. Raja</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Venkatesh</surname>
            ,
            <given-names>F.A.</given-names>
          </string-name>
          <string-name>
            <surname>Cheikh</surname>
            and
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Busch</surname>
          </string-name>
          ,
          <article-title>" On the vulnerability of extended Multispectral face recognition systems towards presentation attacks "</article-title>
          ,
          <source>ISBA</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Almutairi</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Riddle</surname>
          </string-name>
          ,
          <article-title>"Security threat classification for outsourced IT Projects"</article-title>
          ,
          <source>RCIS</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>447</fpage>
          -
          <lpage>448</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <source>Fig.2. Global security threat Posture.</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>H.H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.B.</given-names>
            <surname>Shi</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <article-title>"Distribution system planning incorporating distributed generation and cyber system vulnerability"</article-title>
          ,
          <source>The Journal of Engineering</source>
          , pp.
          <fpage>2189</fpage>
          -
          <lpage>2202</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K.W.</given-names>
            <surname>Kongsgard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.A.</given-names>
            <surname>Nordbotten</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mancini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Haakseth</surname>
          </string-name>
          and
          <string-name>
            <given-names>Paal E.</given-names>
            <surname>Engelstad</surname>
          </string-name>
          ,
          <article-title>"Data Leakage Prevention for Secure Cross-Domain Information Exchange"</article-title>
          ,
          <source>IEEE Communication Magazine</source>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>43</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
            <surname>Hohl</surname>
          </string-name>
          ,
          <article-title>"Automatically protecting computer system from attacks exploit security vulnerabilities", Sony Corporation (Minato-ku</article-title>
          ,
          <source>JP)</source>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <surname>Dan Wu</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Zheng</surname>
            and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Guizani</surname>
          </string-name>
          ,
          <article-title>"Joint physical-application layer security for wireless multimedia delivery"</article-title>
          ,
          <source>IEEE Communications Magazine, Issue:3</source>
          , pp.
          <fpage>66</fpage>
          -
          <lpage>72</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Jiming</given-names>
            <surname>Chen</surname>
          </string-name>
          , Junkun and
          <string-name>
            <surname>Ten H. Lai</surname>
          </string-name>
          ,
          <article-title>"Energy-Efficient Intrusion Detection with a Barrier of Probailistic Sensors: Global and Local"</article-title>
          ,
          <source>IEEE Transaction on Wireless Communications</source>
          , Volume:
          <volume>12</volume>
          , Issue:9, pp.
          <fpage>4742</fpage>
          -
          <lpage>4755</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gharbaoui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Paolucci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Giorgetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Martini</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Castoldi</surname>
          </string-name>
          ,
          <article-title>"Effective Sttatistical Detection of Smart Confidentiality Attacks in Multi-Domain Networks"</article-title>
          ,
          <source>IEEE Transactions on Network and Service Management</source>
          , Volume:
          <volume>10</volume>
          , Issue:4, pp.
          <fpage>383</fpage>
          -
          <lpage>397</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Giraldo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cardenas</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Kantarcioglu</surname>
          </string-name>
          ,
          <article-title>"Security vs. privacy: How integrity attacks can be masked by the noise of differential privacy"</article-title>
          ,
          <source>American Control Conference(ACC)</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>1679</fpage>
          -
          <lpage>1684</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>X. Z.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q. H.</given-names>
            <surname>Zhen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X. H.</given-names>
            <surname>Guan</surname>
          </string-name>
          ,
          <article-title>"Research on Security Situation assessment of networked systems"</article-title>
          ,
          <source>Journal of Xi'an Jiaotong University</source>
          , vol.
          <volume>38</volume>
          , no.
          <issue>04</issue>
          , pp.
          <fpage>404</fpage>
          -
          <lpage>408</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>[13] "SNORT"</source>
          ,
          <year>2010</year>
          ; http://www.snort.org/.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>