期刊文献+

基于危险理论的信息安全风险评估模型 被引量:13

Risk assessment model for information security based on danger theory
原文传递
导出
摘要 为了解决目前信息安全风险评估系统中存在的主观性强、静态评估等问题,该文提出了一种基于生物免疫学危险理论的信息安全风险评估模型DT-RA,采用危险信号触发机制,能够应对不断变化的信息系统和网络环境,然后给出了一种基于DT-RA模型的安全事件发生可能性风险的计算方法,最后根据国标计算得出整个信息系统的风险值。本文在假设一定资产规模的信息系统受到随时间变化的不同威胁级别攻击的情况下进行了仿真实验。实验结果表明:信息系统的风险值反映了攻击强度,分析了免疫措施的实施情况、受攻击资产数目等因素,风险值将表征信息安全风险评估系统为类似生物体免疫系统,系统随风险值逐渐衰减或采取系统级别免疫措施。DT-RA模型对评估信息系统的安全风险是有效、可行的,具有实时、定量、客观的优点,大量减少了对人工经验的依赖,具有实用意义。 Information security risk assessments,such as subjective and static assessments are improved by an information security risk assessment system based on Biological Immunology Danger Theory.The system uses the danger signal trigger mechanism to deal with mutated information systems and networks.This model is used to calculate the possibility of a security incident.The information system risk is then calculated according to the Chinese standard.Simulations with asset scale,attack priorities and changing attacks show the risk,the analysis immunity and the number of attacked assets.The information system risk is reduced and the system is protected from various attacks,which is similar to the Biological Immune System.The model effectively assesses information system security risks using real-time analyses which greatly reduce the dependence on artificial experience.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第10期1231-1235,共5页 Journal of Tsinghua University(Science and Technology)
基金 国家航空科学基金资助项目(05F2037) 国防工业基础基金资助项目(Q072006C002-1)
关键词 风险评估 生物免疫 危险理论 信息安全 risk assessment biological immunology danger theory information security
  • 相关文献

参考文献7

  • 1GB/T 20984-2007.信息安全技术信息安全风险评估规范[S].中国国家质量监督检验检疫局,2007.
  • 2Chiang F, Braun R. Self-adaptability and vulnerability assessment of secure autonomic communication networks [C]// Ata S, Hong C S, ed. Proceedings of the Asia-Pacific Network Operations and Management Symposium. Heidelberg, Germany: Springer-Verlag Berlin, 2007, 112 - 122.
  • 3LI Tao.An immunity based network security risk estimation[J].Science in China(Series F),2005,48(5):557-578. 被引量:30
  • 4彭凌西,陈月峰,刘才铭,曾金全,刘孙俊,赵辉.基于危险理论的网络风险评估模型[J].电子科技大学学报,2007,36(6):1198-1201. 被引量:12
  • 5Lippmann R, Webster S, Stetson D. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection [C]// Wespi A, Vigna G, Deri L, ed. Proceeding of the 15th International Symposium on Recent Advances in Intrusion Detection. Berlin, Heidelberg, Germany- Springer-Verlag, 2002:307-326.
  • 6Roesch M, Green C. Snort users manual, snort release 2. 8.2 [Z/OL]. (2010-10-20), http.. //www. snort, org/docs/.
  • 7Sun L, Srivastava R P, Mork T J, et al. An information systems security risk assessment model under the Dempster-Shafer theory of belief functions [J]. Journal of Management Information Systems, 2006, 22(4) : 109 - 142.

二级参考文献12

  • 1LI Tao.An immunity based network security risk estimation[J].Science in China(Series F),2005,48(5):557-578. 被引量:30
  • 2陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 3张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 4ORTALO R, DESWARTE Y, KAANICHE M. Experimenting with quantitative evaluation tools for monitoring operational security[J]. IEEE Trans on Software Engineering, 1999, 25(5): 633-650.
  • 5RITCHEY R, AMMANN P. Using model checking to analyze network vulnerabilities[C]//Proceedings of the IEEE Symp on Security and Privacy. Berkeley: IEEE Computer Society Press, 2000.
  • 6JAJODIA S, NOEL S, OBERRY B. Topological analysis of network attack vulnerability[C]//Managing Cyber Threats: Issues, Approaches and Challenges. [S.l.]: Springer-Verlag, 2005: 248-266.
  • 7BURNET F M. The Clonal selection theory of acquired immunity[M]. London: Cambridge University Press, 1959.
  • 8FORREST S, PERELSON A, CHERUKURI R. Self-nonself discrimination in a computer[C]//Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy. Los Almitos: IEEE Computer Society, 1994.
  • 9MATZINGER P. The danger model: a renewed sense of selt[J]. Science, 2002, 296(5566): 301-305.
  • 10HAINS W, LIPPMANN R, DAVID J F, et al. 1999 DARPA intrusion detection evaluation: design and procedures[R]. MIT Lincoln Laboratory, 2001.

共引文献75

同被引文献137

引证文献13

二级引证文献151

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部