期刊文献+

基于网络服务状态分析的安全态势定量感知方法 被引量:2

Method of Quantifying Network Security Situational Awareness Based on Analysis of Network Service States
下载PDF
导出
摘要 针对网络安全状况量化分析难的现状,运用博弈论开展基于影响模型的网络安全态势定量感知方法研究.该方法将网络服务状态作为基本态势要素,综合考虑网络系统中存在的攻防行为,建立了网络安全态势博弈模型,并对状态空间、策略集和效用函数等模型参数给出了明确定义,经仿真实验找到该模型的Nash均衡解,在均衡局势下攻防双方达到收益平衡,完成了对网络安全态势的定量刻画.研究表明,该方法无需考虑攻击行为细节,具有效率高、实时性较强等特点,全面完成了对网络安全态势的量化分析,为安全管理员正确决策提供支持. Aiming at the actuality that network security was hard to be quantified, gambling theory.was adopted in research on quantification of network security situational awareness based on impact model. Network service states were regarded as basic situational elements, network offense and defense behaviors were both taken into account, gambling model for network security situation was constructed, in which the model parameters such as state space, strategy set and payoff function were definitely formulated. By simulation experiment, the Nash equilibriums was computed when attackers and defenders got a balance between payoffs, then quantitative depict of network security situation was accomplished. Research shown this method has shielded details about attacks, and it is efficient and realtime, quantitative analysis of comprehensive network security situation can be accomplished which will help security administrator to make correct decisions.
出处 《北京交通大学学报》 CAS CSCD 北大核心 2009年第2期103-107,共5页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 国家"863计划"项目资助(2007ZZ01Z401) 国家自然科学基金重大研究计划资助项目(90718003)
关键词 网络安全 态势感知 博弈论 网络服务状态 NASH均衡 network security situational awareness gambling theory network service state Nash equilibrium
  • 相关文献

参考文献13

  • 1Tim Bass. Intrusion Detection System and Multi-Sensor Data Fusion[J]. Communications of the ACM, 2000, 43 (4) : 99 - 105.
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3Robert Ball, Glenn A. Fink. Home-Centric Visualization of Network Traffic for Security Administration[ C] // Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. Washington DC, Oct., 2004:55 - 64.
  • 4Soon Tee Teoh, Kwan Liu Ma, S Felix Wu, et al. Case Study: Interactive Visualization for Internet Security[ C] //Proceedings of IEEE VIS. Boson, Oct., 2002:505 - 508.
  • 5Gregory Conti, Kulsoom Abdullah. Passive Visual Fingerprinting of Network Attack Tools[ C]//Proceedings of the 2004 ACM workshop on VizSEC/DMSEC. Fairfax, Oct., 2004 : 45 - 54.
  • 6Kiran Lakkaraju, William Yurcik, Adam J Lee. NVision- IP: NetFlow Visualizations of System State for Security Situational Awareness[ C]// Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. ACM Press, New York: USA, Oct., 2004:65 - 72.
  • 7Phillip A Porras, Richard A Kemmerer. Penetration State Transition Analysis A Rule-Based Intrusion Detection Approach[ C]//Proceedings of the 8th Annual Computer Security Applications Conference. San Antonio, Nov., 1992: 220 - 229.
  • 8Jason Shifflet. A Technique Independent Fusion Model for Network Intrusion Detection[ C]//Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics. Granville, Oct., 2004:13 - 19.
  • 9Stephen G Batsell, Nageswara S Rao, Mallikarjun Shankar. Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security [ EB/OL]. (2005-02-22). [2007-11-10]. http://www.iec. ornl. gov/projects/documents/containment. pdf.
  • 10Stephen Lau. The Spinning Cube of Potential Doom[J]. Communications of the ACM., 2004, 47(6) : 25 - 26.

二级参考文献55

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2Qu G.,Jayaprakash,Ramkishore M.,Hariri S.,Raghavendra C.S.A framework for network vulnerability analysis.In:Proceedings of the 1st IASTED International Conference on Communications,Internet,Information Technology (CⅡT2002),St.Thomas,Virgin Islands,USA,2002,289~298
  • 3Moore A.P.,Ellison R.J.,Linger R.C.Attack modeling for information security and survivability.Carnegie Mellon Univer sity:Technical Note CMV/SEI-2001-TH-001,2001
  • 4Jonsson E.,Olovsson T.A quantitative model of the security intrusion process based on attacker behavior.IEEE Transactions on Software Engineering,1997,23(4):235~245
  • 5Mahimkar A.,Shmatikov V.Game-based analysis of Denial-of-service prevention protocols.In:Proceedings of the IEEE Computer Security Foundations Workshop(CSFW05),Aix-en-Provence,France,2005,287~301
  • 6Xia Zheng-You,Zhang Shi-Yong.A kind of network security behavior model based on game theory.In:Proceedings of the 4th International Conference on Parallel and Distributed Computing,Applications and Technologies,PDCAT,Chengdu,China,2003,950~954
  • 7Avizenis A.,Laprie J.,Randell B.Fundamental concepts of dependability.In:Proceedings of the 3rd Information Survivability Workshop,Boston,MA,2000,7~12
  • 8Goseva-Postojanova K.,Wang F.,Wang R.,Gong F.,Vaidyanathan K.,Trivedi K.S.,Muthusamy B.Characterizing intrusion tolerant systems using a state transition model.In:Proceedings of DARPA DISCEX Ⅱ Conference,2001,Ⅱ(2):211~221
  • 9Schneier B.Secrets and Lies:Digital Security in a Networked World.New York:John Wiley & Sons,2000
  • 10Dacier M.Towards quantitative evaluation of computer secur ity[Ph.D.dissertation].Institut National Polytechnique de Toulouse,France,1994

共引文献91

同被引文献12

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部