期刊文献+

基于贝叶斯网络的脆弱性状态评估方法 被引量:6

A network vulnerability evaluation method based on Bayesian networks
下载PDF
导出
摘要 对网络安全性的量化评估问题是目前网络安全领域的研究热点之一.通过对现有的网络安全模型及量化分析方法的研究和比较,针对影响网络安全性的各项因素的全面脆弱性评估,提出了网络可靠度、脆弱点关键度、脆弱性状态图最低阶最小路集和最低阶最小割集4个具体的评估指标,将基于贝叶斯网络的计算方法引入脆弱性评估中,提出了量化评估计算方法.在此基础上构建了网络实例,使用SPIN验证工具对网络攻击进行模拟并对提出的评估指标及算法进行了分析验证.实验结果表明,提出的算法和评估指标集能够正确地量化反映网络的安全状态. Network vulnerability evaluation is a hot topic of network security research. In this paper we analyze and compare the existing network security model and quantitative assessment methods. Considering all the securityrelated factors of network in vulnerability evaluation, we propose a set of evaluation metrics that includes reliability parameters of network, criticality parameters of network, lowest degree of minimal path set and lowest degree of minimal cut set. We also propose a new method of quantitative assessment based on Bayesian network. Finally we give an example to simulate the net-attack using SPIN and validate vulnerability evaluation indices and methods. The result shows that the method and the evaluation indices could evaluate and reflect the security state of network successfully.
出处 《中国科学院研究生院学报》 CAS CSCD 2008年第5期639-648,共10页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 国家高技术研究发展计划(863)项目(2006AA01Z437)资助
关键词 脆弱性评估 评估指标 贝叶斯网络 量化评估 vulnerability evaluation, evaluation indices, Bayesian networks, quantitative assessment
  • 相关文献

参考文献3

二级参考文献23

  • 1王广彦,马志军,胡起伟.基于贝叶斯网络的故障树分析[J].系统工程理论与实践,2004,24(6):78-83. 被引量:95
  • 2[1]GREEN J,MARCHETTE D,NORTHCUTT S.Analysis Techniques for Detecting Coordinated Attacks and Probes [ EB/OL].http:∥www.blacksheepnetworks.com/security/info/misc/coord.html,2004.
  • 3[2]ECKMANN ST,VIGNA G,KEMMERER PA.Statl:An attack language for state-based intrusion detection[ A].Proceedings of the ACM Working on Intrusion Detection[ C].2000.
  • 4[3]PENG N.Abstraction-based Intrusion Detection in Distributed Environments[D].George Mason University,2001.
  • 5[4]BRO PV.A system for detecting network intruders in real-time [A].Proceedings of the 7th Usenix Security Symposium[ C].1998.
  • 6Dacier M,Deswarte Y,Kaaniche M.Quantitative assessment of operational security models and tools.Technical Report,96493,LAAS,1996.
  • 7Ortalo R,Deswarte Y.Information systems security:Specification and quantitative evaluation.Technical Report,DeVa ESPRIT Long Term Research Project No.20072,the 2nd Year Report,LAAS-CNRS & INRIA,1997.561-584.
  • 8Ortalo R,Deswarte Y,Ka(a)niche M.Experimenting with quantitative evaluation tools for monitoring operational security.IEEE Trans.on Software Engineering,1999,25(5):633-650.
  • 9Swiler LP,Phillips C,Gaylor T.A graph-based network-vulnerability analysis system.Technical Report,SANDIA Report No.SAND 97-3010/1,1998.
  • 10Sheyner O.Scenario graphs and attack graphs[Ph.D.Thesis].Pittsburgh:Carnegie Mellon University,2004.

共引文献124

同被引文献52

  • 1程叶霞,姜文,薛质,程叶坚.基于攻击图模型的多目标网络安全评估研究[J].计算机研究与发展,2012,49(S2):23-31. 被引量:9
  • 2裴玉龙,郎益顺.Research on traffic congestion mechanism and countermeasures based on dynamic traffic assignment[J].Journal of Harbin Institute of Technology(New Series),2005,12(3):235-238. 被引量:3
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 4张涛,胡铭曾,云晓春,李东,孙亮.网络攻击图生成方法研究[J].高技术通讯,2006,16(4):348-352. 被引量:7
  • 5Ritchey R, Ammann P. Using model checking to analyze network vulnerabilities//Proceedings of the 2000 IEEE Symposium on Research on Security and Privacy. Oakland, California, USA, 2000:156 -165.
  • 6Ammann P, Wijesekera D, Kaushik S. Scalable, graph- based network vulnerability analysis//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington, DC, USA, 2002: 217-224.
  • 7Cheung S, Lindqvist U, Fong M W. Modeling multi-step cy her attacks for scenario recognition//Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX III). Washington, DC, USA, 2003: 284-292.
  • 8Mehta V, Bartzis (2, Zhu H F. Ranking attack graphs// Zamboni D, Kruegel C eds. RAID 2006. Lecture Notes in Computer Science 4219. Berlin Heidelberg: Sprlnger-Verlag, 2006, 127-144.
  • 9Wang LY, Noel S, Jajodia S. Minimum-cost network hard ening using attack graphs. Computer Communications, 2006, 29(18) : 3812-3824.
  • 10Sheyner O, Haines J, Jha S, Lippmann R, Wing J M. Auto mated generation and analysis of attack graphs//Proceedings of the 2002 IEEE Symposium on Security and Privacy. Berkeley, California, USA, 2002:273-284.

引证文献6

二级引证文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部