期刊文献+

基于贝叶斯网络近似推理的网络脆弱性评估方法 被引量:13

Bayesian-network-approximate-reasoning-based method for network vulnerabilities evaluation
下载PDF
导出
摘要 针对大规模计算机网络的脆弱性评估,提出了一种基于贝叶斯网络近似推理的评估方法,对网络各组件和影响网络安全的因素进行建模,采用模型检测工具生成攻击状态转移图,描述网络脆弱性的利用过程,通过采用随机采样的方法对网络的攻击状态转移图进行近似推理,经过对采样样本的统计分析得到网络脆弱性评估的量化结果,为提升网络的安全性能提供理论依据。 To evaluate the large-scale computer networks, a Bayesian-network-approximate-reasoning-based method for vulnerabilities evaluation was proposed. First, it models the elements which compose the network and the factors which affect the network security. Second, it builds the attack state graph (ASG) of the computer network to describe the process of vulnerability exploitation. Then, it makes the approximate reasoning to the ASG by stochastic sampling. At last, after the samples analysis and statistic, it achieves the quantitative evaluation result and will provide the theoretical evidence to imorove the network security.
出处 《通信学报》 EI CSCD 北大核心 2008年第10期191-198,共8页 Journal on Communications
基金 国家高技术研究发展计划("863"计划)基金资助项目(2006AA01Z437 2006AA01Z412 2006AA01Z433)~~
关键词 计算机网络 贝叶斯网络近似推理 随机采样 攻击状态转移图 脆弱性 computer network Bayesian network approximate reasoning stochastic sampling attack state graph vul-nerabilities
  • 相关文献

参考文献3

二级参考文献29

  • 1蒋屹新,林闯,曲扬,尹浩.基于Petri网的模型检测研究[J].软件学报,2004,15(9):1265-1276. 被引量:20
  • 2冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:30
  • 3Dacier M,Deswarte Y,Kaaniche M.Quantitative assessment of operational security models and tools.Technical Report,96493,LAAS,1996.
  • 4Ortalo R,Deswarte Y.Information systems security:Specification and quantitative evaluation.Technical Report,DeVa ESPRIT Long Term Research Project No.20072,the 2nd Year Report,LAAS-CNRS & INRIA,1997.561-584.
  • 5Ortalo R,Deswarte Y,Ka(a)niche M.Experimenting with quantitative evaluation tools for monitoring operational security.IEEE Trans.on Software Engineering,1999,25(5):633-650.
  • 6Swiler LP,Phillips C,Gaylor T.A graph-based network-vulnerability analysis system.Technical Report,SANDIA Report No.SAND 97-3010/1,1998.
  • 7Sheyner O.Scenario graphs and attack graphs[Ph.D.Thesis].Pittsburgh:Carnegie Mellon University,2004.
  • 8Sheyner O,Haines J,Jha S,Lippmann R,Wing JM.Automated generation and analysis of attack graphs.In:Hinton H,Blakley B,Abadi M,Bellovin S,eds.Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2002.273-284.
  • 9Jha S,Sheyner O,Wing JM.Minimization and reliability analyses of attack graphs.Technical Report,CMU-CS-02-109,Carnegie Mellon University,2002.
  • 10Cimatti A,Clarke E,Giunchiglia F,Roveri M.NuSMV:A new symbolic model verifier.In:Halbwachs N,Peled D,eds.Proc.of the 11th Conf.on Computer-Aided Verification (CAV'99).LNCS 1633,Trento:Springer-Verlag,1999.495-499.

共引文献69

同被引文献174

引证文献13

二级引证文献147

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部