ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
Research on Network Security Situational Awareness and Risk Assessment Model Based on Bayesian Network
PDF
HTML

Keywords

Bayesian network
network security
risk assessment research
situational awareness

How to Cite

[1]
X. . Ying, “Research on Network Security Situational Awareness and Risk Assessment Model Based on Bayesian Network”, JCSANDM, vol. 14, no. 01, pp. 155–180, Feb. 2025.

Abstract

With the rapid development of the information society, security threats in cyberspace are increasing day by day, posing severe challenges to national infrastructure, commercial operations, and even personal privacy. At present, the research of network security situational awareness and risk assessment model is faced with critical problems, such as significant demand for prior knowledge, high complexity of inference algorithm, insufficient dynamic adaptability, and inaccurate identification of risk categories. In view of this, this study proposes a new network security situational awareness and risk assessment model based on the Bayesian network, aiming to achieve timely early warning and accurate prediction of network threats through probability statistics methods. By comprehensively considering various heterogeneous data sources such as network traffic anomalies, system log anomalies, and external threat intelligence, we built a sizeable Bayesian network covering thousands of nodes and hundreds of thousands of edges to describe the occurrence mechanism and evolution path of network security incidents. Empirical research shows that the optimized model has an accuracy rate of 92%, a recall rate of 89%, and an F1 score of 90.5% on the test dataset, which is significantly better than the existing rule-based and machine-learning methods, especially when dealing with low-frequency threats with apparent long-tail effects, showing more robust adaptability and prediction accuracy. By dynamically monitoring the changing trend of network activities, we can identify potential risk points in advance, help take proactive protective measures before security threats occur, and effectively reduce economic losses caused by network intrusions. This study not only provides a brand-new theoretical framework and technical means for network security situational awareness and risk assessment but also opens up broad prospects for subsequent research directions and application scenarios.

https://doi.org/10.13052/jcsm2245-1439.1417
PDF
HTML

References

Husák, M., L. Sadlek, S. Špaček, M. Laštovička, M. Javorník & J. Komárková, “CRUSOE: A toolset for cyber situational awareness and decision support in incident handling,” Computers & Security, vol. 115, pp. 102609, 2022.

J S, S. M., M. Thirunavukkarasu, N. Kumaran and D. Thamaraiselvi, “Deep learning with blockchain based cyber security threat intelligence and situational awareness system for intrusion alert prediction,” Sustainable Computing: Informatics and Systems, vol. 42, pp. 100955, 2024.

Mouti, S., S. K. Shukla, S. A. Althubiti, M. A. Ahmed, F. Alenezi and M. Arumugam, “Cyber Security Risk management with attack detection frameworks using multi connect variational auto-encoder with probabilistic Bayesian networks,” Computers and Electrical Engineering, vol. 103, pp. 108308, 2022.

Rique, T., M. Perkusich, K. Gorgônio, H. Almeida and A. Perkusich, “Constructing the graphical structure of expert-based Bayesian networks in the context of software engineering: A systematic mapping study,” Information and Software Technology, vol. 177, pp. 107586, 2025.

Sun, J., K. Bathgate and Z. Zhang, “Bayesian network-based resilience assessment of interdependent infrastructure systems under optimal resource allocation strategies,” Resilient Cities and Structures, vol. 3, no. 2, pp. 46–56, 2024.

Liu, Q., W. Liu, Y. Li, K. Sun, X. Zheng, C. Cao, J. Li and W. Qin, “Quantitative risk assessment for connected automated Vehicles: Integrating improved STPA-SafeSec and Bayesian network,” Reliability Engineering & System Safety, vol., pp. 110528, 2024.

Liu, Z., D. Yang, S. Wang and H. Su, “Adaptive multi-channel Bayesian graph attention network for IoT transaction security,” Digital Communications and Networks, vol. 10, no. 3, pp. 631–644, 2024.

Moreira, R., R. S. Villaça, M. R. N. Ribeiro, J. S. B. Martins, J. H. Corrêa, T. C. Carvalho and F. de Oliveira Silva, “An intelligent native network slicing security architecture empowered by federated learning,” Future Generation Computer Systems, vol. 163, pp. 107537, 2025.

Pourbehzadi, M., G. Javidi, C. J. Howell, E. Kamar and E. Sheybani, “Enhanced (cyber) situational awareness: Using interpretable principal component analysis (iPCA) to automate vulnerability severity scoring,” Decision Support Systems, vol. 186, pp. 114308, 2024.

Salim, D. T., M. M. Singh and P. Keikhosrokiani, “A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model,” Heliyon, vol. 9, no. 7, pp. e17156, 2023.

Sonal and D. Ghosh, “Impact of situational awareness attributes for resilience assessment of active distribution networks using hybrid dynamic Bayesian multi criteria decision-making approach,” Reliability Engineering & System Safety, vol. 228, pp. 108772, 2022.

Tang, W., H. Yang, J. Pi and C. Wang, “Network virus propagation and security situation awareness based on Hidden Markov Model,” Journal of King Saud University – Computer and Information Sciences, vol. 35, no. 10, pp. 101840, 2023.

Xie, M., “Smart Grid Borderless Access Control Technology based on network security situational awareness,” Energy Reports, vol. 8, pp. 415–423, 2022.

Xu, M., S. Liu and X. Li, “Network security situation assessment and prediction method based on multimodal transformation in edge computing,” Computer Communications, vol. 215, pp. 103–111, 2024.

Hu, J., X. Hu, F. Kong and H. Wu, “Vulnerability analysis of super high-rise building security system based on Bayesian network and digital twin technology,” Process Safety and Environmental Protection, vol. 187, pp. 1047–1061, 2024.

Jia, R., J. Zhang, Y. Lin, Y. Han and F. Yang, “Cluster Detection Method of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network,” Computers, Materials and Continua, vol. 79, no. 2, pp. 2523–2546, 2024.

Junwu, W., L. Yipeng and F. Jingtao, “Integrating Bayesian networks and ontology to improve safety knowledge management in construction behavior: A conceptual framework,” Ain Shams Engineering Journal, vol. 15, no. 9, pp. 102906, 2024.

Yagci, M. Y. and M. A. Aydin, “EA-GAT: Event aware graph attention network on cyber-physical systems,” Computers in Industry, vol. 159–160, pp. 104097, 2024.

Zhang, J., J. Zheng, Z. Zhang, T. Chen, Y.-a. Tan, Q. Zhang and Y. Li, “ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks,” Computer Networks, vol. 245, pp. 110376, 2024.

Zhang, L., S. Hu, M. Trik, S. Liang and D. Li, “M2M communication performance for a noisy channel based on latency-aware source-based LTE network measurements,” Alexandria Engineering Journal, vol. 99, pp. 47–63, 2024.

Zhang, S., H. Yi and D. An, “VTion-PatchTST: Elevated PatchTST model for network security situation prediction,” Computers and Electrical Engineering, vol. 118, pp. 109393, 2024.

Zhao, D., P. Shen and S. Zeng, “ALSNAP: Attention-based long and short-period network security situation prediction,” Ad Hoc Networks, vol. 150, pp. 103279, 2023.

Zhao, Y., G. Cheng, Y. Duan, Z. Gu, Y. Zhou and L. Tang, “Secure IoT edge: Threat situation awareness based on network traffic,” Computer Networks, vol. 201, pp. 108525, 2021.

Ahmadisourenabadi, B., M. Marzband, S. Hosseini-Hemati, S. M. B. Sadati and A. Rastgou, “Quantifying and enabling the resiliency of a microgrid considering electric vehicles using a Bayesian network risk assessment,” Energy, vol. 308, pp. 133036, 2024.

Alzahrani, S., H. Alsuwat and E. Alsuwat, “Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks: An Empirical Study,” CMES – Computer Modeling in Engineering and Sciences, vol. 139, no. 2, pp. 1635–1654, 2024.

Costa Fonseca, N. and J. Vinícius de França Carvalho, “Analysis of financial contagion among economic sectors through Dynamic Bayesian Networks,” Expert Systems with Applications, vol. 260, pp. 125448, 2025.

d’Ambrosio, N., G. Perrone and S. P. Romano, “Including insider threats into risk management through Bayesian threat graph networks,” Computers & Security, vol. 133, pp. 103410, 2023.

George, P. G. and V. R. Renjith, “Evolution of Safety and Security Risk Assessment methodologies towards the use of Bayesian Networks in Process Industries,” Process Safety and Environmental Protection, vol. 149, pp. 758–775, 2021.

He, W., X. Cai, Y. Lai and X. Yuan, “ESVI-GaMM: A fast network intrusion detection approach based on the Bayesian gamma mixture model,” Information Sciences, vol. 678, pp. 121001, 2024.

Hemmatian, M., A. Shahzadi and S. Mozaffari, “Uncertainty-based knowledge distillation for Bayesian deep neural network compression,” International Journal of Approximate Reasoning, vol. 175, pp. 109301, 2024.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Copyright (c) 2025 Journal of Cyber Security and Mobility

Downloads

Download data is not yet available.