期刊文献+

面向安全态势的权限有效性定量评估方法 被引量:1

Quantitative assessment of privilege validity for security situation awareness
下载PDF
导出
摘要 针对安全态势评估领域的权限有效性评估指标,融合网络流量、入侵检测系统(IDS)报警和扫描信息,提出一种全新的权限有效性定量评估方法.该方法将用户权限作为安全目标,基于网络会话构建威胁用户权限的入侵迹,并使用M arkov数学模型度量安全目标失败的平均入侵代价,进而定量评估权限有效性.实验结果表明,当系统遭受缓冲区溢出攻击时,权限有效性指数接近于0.该方法能够实时评估缓冲区溢出攻击对系统权限有效性的威胁,有效监控黑客行为引起的系统安全态势变化.与其他评估方法相比,该方法考虑了报警之间的因果关系,降低了IDS误报以及无效入侵信息对安全态势评估精度的影响,有助于管理员了解黑客入侵步骤、决策系统安全状况以及识别高危险的入侵路径. Aiming at the evaluation index of privilege validity in the area of security situation aware- ness, a novel method of quantitatively assessing privilege validity is put forward by syncretizing net-work traffic, intrusion detection system (IDS) alerts and scanning information. Regarding user privilege as the security objective, intrusion footprints threatening the user privilege are constructed based on network sessions. Then, mean intrusion efforts for compromising the security objective are calculated by Markov model and further used to quantitatively assess privilege validity. The experimental results show that the value of privilege validity is close to 0 when the monitored network system is subjected to the attack of the buffer overflow. This method can real-timely assess the threat of buffer overflow exploits on the system's privilege validity, and effectively monitor the variations of security situation caused by hackers' illegal action. Compared with other evaluation methods, it takes into account the causal relationship between alerts and reduces the effect of IDS positive and invalid alerts on the precision of security situation assessment. Moreover, it helps administrators understand hackers' attack steps, judge security status and identify the intrusion footprint with high risk.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第4期742-746,共5页 Journal of Southeast University:Natural Science Edition
基金 国家自然科学基金资助项目(60605019 6077209) 国家教育部博士点基金资助项目(20070248002) 国家高技术研究发展计划(863计划)资助项目(2007AA01Z473)
关键词 网络安全 态势评估 MARKOV模型 权限有效性 network security situation awareness Markov model privilege validity
  • 相关文献

参考文献10

  • 1Porras P A, Fong M W, Valdes A. A mission-impactbased approach to INFOSEC alarm correlation [ C ]// The Fifth International Symposium on Recent Advances in Intrusion Detection. Zurich, Switzerland, 2002 : 95 - 114.
  • 2秦华旺,戴跃伟,王执铨.入侵容忍系统的安全态势评估[J].北京邮电大学学报,2009,32(2):57-61. 被引量:2
  • 3韦勇,连一峰.基于日志审计与性能修正算法的网络安全态势评估模型[J].计算机学报,2009,32(4):763-772. 被引量:97
  • 4Si Jiaquan, Wang Kaizhuo, Wang Wei, et al. Study of index weight in network threat evaluation based on improved grey theory [ C ]//IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application. Wuhan,China,2008 : 9 - 13.
  • 5Lippmann Richard, Webster Seth, Stetson Douglas. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection[C]//The Fifth International Symposium on Recent Advances in Intrusion Detection. Zurich, Switzerland, 2002 : 307 - 326.
  • 6Manganaris Stefanos, Christensen Marvin, Zerkle Dan, et al. A data mining analysis of RTID alarms[J].Computer Networks, 2000,34 ( 4 ) : 571 - 577.
  • 7Martin Roesch, Chris Green. Snort users manual 2. 0. 0 [ EB/OL ]. ( 2004-08-02 ) [ 2005-02-01 ]. http ://www. snort, org/docs/snort_manual.
  • 8Taylor Carol, Alves-Foss Jim. An empirical analysis of NATE--network analysis of anomalous traffic events [ C]//The Tenth New Security Paradigms Workshop, Virginia Beach, USA, 2002 : 18 - 26.
  • 9Ortalo Rodolphe, Deswarte Yves, Kaaniche Mohamed. Experimenting with quantitative evaluation tools for monitoring operational security[J]. IEEE Transactions on Software Engineering, 1999,25 ( 5 ) : 633 - 651.
  • 10陈秀真,李建华.基于OVAL的新型漏洞评估系统[J].小型微型计算机系统,2007,28(9):1554-1557. 被引量:8

二级参考文献26

  • 1陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 2童明荣,薛恒新,林琳.基于Holt-Winter模型的铁路货运量预测研究[J].铁道运输与经济,2007,29(1):79-81. 被引量:10
  • 3Lau S. The spinning cube of potential doom. Communications of the ACM, 2004, 47(6): 25-26
  • 4Lakkaraju K, Yurcik W, Lee A J. NVisionlP: Netflow visualizations of system state for security situational awareness// Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. Washington DC, 2004: 65-72
  • 5Yin X, Yurcik W, Treaster M. VisFlowConnect: Netflow visualizations of link relationships for security situational awareness//Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. Washington DC, 2004:26-34
  • 6Bass T. Intrusion detection systems & multisensor data fusion: Creating cyberspace situational awareness. Communications of the ACM, 2000, 43(4): 99-105
  • 7D' Ambrosio B. Security situation assessment and response evaluation (SSARE)//Proceedings of the DARPA Informa- tion Survivability Conference & Exposition Ⅱ. Anaheim, 2001 : 387-394
  • 8Yegneswaran V, Barford P, Paxson V. Using honeynets for internet situational awareness//Proceedings of the 4th Workshop on Hot Topics in Networks. Maryland, 2005
  • 9George E P B, Gwilym M J. Time Series Analysis: Forecasting and Control. San Francisco: Holden Day Inc. , 1976
  • 10Fall K, Varadhan K. The ns manual (formerly ns notes and documentation). California: UC Berkeley, LBL, USC/ISI, and Xerox PARC, 2007

共引文献104

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部