期刊文献+

主机系统安全实时风险量化评估方法的研究 被引量:4

Study on quantitative assessment method for real-time risk of host system security
下载PDF
导出
摘要 为了评价主机系统的安全风险变化,建立了一个描述主机安全状态的隐马尔可夫模型.利用该模型计算主机处于被攻击状态的概率,分析了影响攻击执行过程的因素,提出了一种计算攻击成功概率的方法,并最终计算主机系统的风险指数.该方法可以动态获取主机系统的风险态势曲线,有利于指导安全管理人员调整安全策略. The simple Hidden Markov Model(HMM) for describing host security states was established to evaluate the security risk of host system.The probability for host to be attacked was calculated by this model.The basic factors of attack executing process was analyzed,and a calculating method for attack success probability was presented,and the quantitative risk index of host system was computed finally.This method can provide the real-time risk curves of host system for security managers to adjust security policies.
出处 《西安工程大学学报》 CAS 2010年第2期203-207,共5页 Journal of Xi’an Polytechnic University
基金 国家自然科学基金项目(60873233) 陕西省科技攻关项目(2008-K04-21)
关键词 主机系统安全 风险量化评估 隐马尔可夫模型 暴露因子 host system security risk assessment hidden Markov model exposure factor
  • 相关文献

参考文献9

  • 1LEE W K,QIN X Z. Statistical causality analysis of INFOSEC alert data[C]// Proc of the 6th Int'l Symp on Recent Advances in Intrusion Detection. Pittsburgh,2003:73-93.
  • 2ARNES A, VALEUR F, VIGNA G, et al. Using hidden Markov models to evaluate the risk of intrusions [ C ]//Proceedings of the RAID'06. Hamburg,2006:145-164.
  • 3HASLUSM Kjetil. Muhiseusor real-time risk assessment using continuous-time hidden Markov models [ C ]//Proceedings of the International Conference onComputafional Intelligence and Security (CIS). Guangzhou,2006:694-703.
  • 4HARIRJ S, QU GZ, DHARMAGADDA T,et al. Impact analysis of faults and attacks in large-scale networks [J]. IEEE Securhy & Privacy, 2003,1 (5) :49-54.
  • 5BLYTH A. Footprinting for intrusion detection and threat assessment [J]. Information Security Technical Report, 1999,4 ( 3 ) :43 -53.
  • 6李伟明,雷杰,董静,李之棠.一种优化的实时网络安全风险量化方法[J].计算机学报,2009,32(4):793-804. 被引量:48
  • 7韦勇,连一峰,冯登国.基于信息融合的网络安全态势评估模型[J].计算机研究与发展,2009,46(3):353-362. 被引量:163
  • 8陈天平,乔向东,郑连清,罗骞.图论在网络安全威胁态势分析中的应用[J].北京邮电大学学报,2009,32(1):113-117. 被引量:9
  • 9陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:339

二级参考文献35

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2陆余良,夏阳.主机安全量化融合模型研究[J].计算机学报,2005,28(5):914-920. 被引量:28
  • 3王益丰,李涛,胡晓勤,宋程.一种基于人工免疫的网络安全实时风险检测方法[J].电子学报,2005,33(5):945-949. 被引量:30
  • 4陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:339
  • 5张永铮,方滨兴,迟悦,云晓春.网络风险评估中网络节点关联性的研究[J].计算机学报,2007,30(2):234-240. 被引量:52
  • 6Ortalo R, Deswarte Y, Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security[J]. IEEE Trans on Software Engineering, 1999, 25(5): 633-651.
  • 7Evans S, Waller J. Risk-based security engineering through the eyes of the adversary[ C] //Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop. New York: IEEE Computer Society Press, 2005 : 158-165.
  • 8Lakkaraju K, Yurcik W, Lee A J. NVisionIP: NetFlow visualizations of system state for security situational awareness [C] //Proc of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York: ACM, 2004:65-72
  • 9Yin Xiaoxin, Yurcik W, Treaster M, et al. VisFlowConnect: NetFlow visualizations of link relationships for security situational awareness [C] //Proc of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York: ACM, 2004:26-34
  • 10朱亮,王慧强,郑丽君.网络安全态势可视化研究评述[OL].[2008-01-08].http://www.paper.edu.cn/downloadpaper.php?serial_number=200607-36

共引文献471

同被引文献25

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部