期刊文献+

一种基于攻击图的云租户系统安全检测方法 被引量:2

A system security inspection method based on attack graph in cloud tenancy system
原文传递
导出
摘要 针对IaaS(基础设施即服务)云服务中云租户系统的安全检测问题,基于概率攻击图,利用虚拟网络数据传输的特点,提出一种新型的系统安全检测方法.该方法根据概率攻击图的分析结果设定虚拟网络的安全检测规则,将检测规则分布到多个虚拟网络,从而减少了网络入口设备上检测规则的数量;根据安全监控模块统计分析的结果动态调整相应漏洞的可用性概率,从而更准确地量化漏洞的可用性概率. 针对IaaS(基础设施即服务)云服务中云租户系统的安全检测问题,基于概率攻击图,利用虚拟网络数据传输的特点,提出一种新型的系统安全检测方法.该方法根据概率攻击图的分析结果设定虚拟网络的安全检测规则,将检测规则分布到多个虚拟网络,从而减少了网络入口设备上检测规则的数量;根据安全监控模块统计分析的结果动态调整相应漏洞的可用性概率,从而更准确地量化漏洞的可用性概率.
作者 毕坤 韩德志
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第S1期30-33,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(61070154) 上海市教委科技创新项目(20110546) 广州市2009难题招贤项目 广东省科技攻关项目(2010B090400160) 中国博士后科学基金资助项目(20110490091) 上海海事大学科研基金资助项目(20110014)
关键词 攻击图 云计算 云安全 网络安全 云租户系统 检测规则 attack graph cloud computing cloud security network security cloud tenancy system inspection rules
  • 相关文献

参考文献5

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 2叶云,徐锡山,贾焰,齐治昌.基于攻击图的网络安全概率计算方法[J].计算机学报,2010,33(10):1987-1996. 被引量:44
  • 3Ingols K,Lippmann R,Piwowarski K.Practical at-tack graph generation for network defense[].Pro-ceedings of the nd Annual Computer Security Ap-plications Conference.2006
  • 4Paul Ammann,Duminda Wijesekera,Saket Kaushik.Scalable, graph-based network vulnerability analysis[].Proceedings of the th ACM Conference on Computer and Communications Security.2002
  • 5Li Kai,Gu Nai-jie,Bi Kun,et al.Network security evaluation algo-rithm based on access level vectors[].Proceedings of YoungComputer Scientists.2008

二级参考文献35

  • 1冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:31
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Mehta V, Bartzis C, Zhu H F. Ranking attack graphs//Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID). Hamburg, Germany, 2006, 127-144.
  • 4Sawilla R, Ou X M. Identifying critical attack assets in dependency attack graphs//Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS). Malaga, Spain, 2008:18-34.
  • 5Ou X M, Boyer W F. A scalable approach to attack graph generation//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS). Alexandria, USA, 2006. 336-345.
  • 6Wang L Y, Tania I. An attack graph-based probabilistic security metric//Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec). London, UK, 2008:283-296.
  • 7Homer J, Ou X M, Schmidt D. A sound and practical approach to quantifying security risk in enterprise networks. Kansas State University: Technical Report 2009-3, 2009.
  • 8Singhal A, Ou X M. Security risk analysis of computer networks: Techniques and challenge//Proceedings of the 16th ACM Computer and Communications Security(CCS). Chicago, USA, 2009.
  • 9Wang L Y, Singhal A, Jajodia S. Measuring the overall security of network configurations using attack graphs//Proceedings of the 21th IFIP WG 11. 3 Working Conference on Data and Applications Security (DBSee). Redondo Beach, CA, USA, 2007:98-112.
  • 10Wang L Y, Singhal A, Jajodia S. Toward measuring network security using attack graphs//Proceedings of the 3rd International Workshop on Quality of Protection (QoP). Alexandria, USA, 2007:49-54.

共引文献1114

同被引文献7

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部