期刊文献+

基于弱点关联和安全需求的网络安全评估方法 被引量:2

Network security evaluation based on vulnerability correlation and security requirements
下载PDF
导出
摘要 针对传统的网络安全量化评估方法忽略了网络弱点间的关联性和目标主机的安全需求,导致评估结果不够准确的问题,提出了一种基于弱点关联和安全需求的网络安全量化评估方法。该方法利用攻击图来计算各弱点被网络攻击者成功利用的概率。在此基础上,计算各弱点对主机可用性、保密性和完整性的影响。最后,根据目标主机的安全需求评估主机和网络的安全性。实例分析表明,该评估方法克服了传统方法孤立地评估各弱点对主机的网络安全性评估的不利影响,获得的评估结果较传统方法更为准确。 The paper points out that traditional quantitative methods for network security assessment usually lead to the inaccurate assessment results because they neglect the vulnerability correlation in networks and the security requirements of target hosts, and based on the analysis of this, proposes a new one which considers the vulnerability correlation and security requirements. The proposed method uses the attack graph to calculate the probability of network attackers' successful exploitation of the vulnerabilities, and based on this, calculates the effects of the vulnerabilities on the availability, confidentiality and integrity of the hosts. Finally, it assesses the security of the hosts and the network according to the security requirements. The analysis of the example indicates that the acquired assessing results by using this method are more accurate than the traditional methods.
出处 《高技术通讯》 CAS CSCD 北大核心 2009年第2期141-146,共6页 Chinese High Technology Letters
基金 863计划(2006AA012451) 973计划(2007CB311100)资助项目
关键词 安全评估 弱点关联 安全需求 攻击图 security assessment, vulnerability correlation, security requirement, attack graph
  • 相关文献

参考文献9

二级参考文献22

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 3Richard Steven W 范建华等(译).TCP/IP详解(卷1):协议[M].北京:机械工业出版社,2000.9-10.
  • 4汪立东.[D].哈尔滨工业大学,2002.
  • 5ASLAM T, KRSUL I, SPAFFORD E H. Use of a taxonomy of security faults[A]. The 19th National Information System Security Conference [C]. Baltimore, Maryland, 1996. 22-25.
  • 6KRSUL I V. Software Vulnerability Analysis[D]. Purdue University, West Lafayette, USA, 1998.
  • 7BISHOP M, BAILEY D. A Critical Analysis of Vulnerability Taxonomies[R]. Technical Report CSE-96-11, Department of Computer Science, University of California, Davis, 1996.
  • 8KNIGHT E, HARTLEY B V. Is your network inviting an attack[J]. Internet Security Advisor, 2000(5/6): 2-5.
  • 9JIWNANI K, ZELKOWITZ M. Maintaining software with a security perspective[A]. ICSM'02[C]. Montréal, 2002. 194-203.
  • 10GLASS R L, VESSEY I. Contemporary application-domain taxonomies[J]. IEEE Software, 1995, 12 (4): 63-76.

共引文献504

同被引文献19

  • 1孙亮,李东,张涛.网络攻击图的自动生成[J].计算机应用研究,2006,23(3):119-122. 被引量:13
  • 2张永铮,方滨兴,迟悦,云晓春.网络风险评估中网络节点关联性的研究[J].计算机学报,2007,30(2):234-240. 被引量:52
  • 3JAJODIA S,NOEL S,O'BERRY B.Managing cyber threats[M].Berlin:Springer-Verlag 2005:247-266.
  • 4LIU N,ZHANG J,ZHANG H,et al.Security assessment for communication networks of power control systems using attack graph and MCDM[J].IEEE Transactions on Power Delivery,2010,25 (4):1492-1500.
  • 5TEN C-W,LIU C-C,MANIMARAN G.Vulnerability assessment of cybersecurity for SCADA systems[J].IEEE Transactions on Power Systems,2008,23 (4):1836-1846.
  • 6FRIGAULT M,WANG L.Measuring network security using Bayesian network-based attack graphs[C] // COMPSAC'08:Proceedings of the 32nd Annual IEEE International Computer Software and Applications.Piscataway,NJ:IEEE Press,2008:698-703.
  • 7MAN D,YANG W,YANG Y,et al.A quantitative evaluation model for network security[C] //CIS 2007:Proceedings of 2007International Conference on Computational Intelligence and Security.Washington,DC:IEEE Computer Society,2007:773-777.
  • 8FRIGAULT M,WANG L,SINGHAL A,et al.Measuring network security using dynamic Bayesian network[C] //QoP'08:Proceedings of the 4th ACM Workshop on Quality of Protection.New York:ACM Press,2008:23-30.
  • 9SINGHAL A, OU X M. Security risk analysis of comput- er networks : Techniques and challenge [ C ]/// Proceed- ings of the 16th ACM Computer and Communications Security (CCS). Chicago, USA,2009.
  • 10SAWILLA R, OU X M. Identifying critical attack as set s in dependency attack graphs [ C ]//Proceedings of the 13th European Symposium on Research in Computer Se- curity (ESORICS). Malaga, Spain, 2008 : 18-34.

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部