期刊文献+

基于动态攻击图的网络安全实时评估 被引量:15

Real-time Network Security Assessment Based on Dynamic Attack Graph
下载PDF
导出
摘要 针对网络安全评估对实时性及可视化的需求,提出了一种基于动态攻击图的实时评估方法。首先通过采集网络的脆弱性、网络拓扑、资产价值等安全属性信息,同时提取入侵检测系统的报警信息、防火墙策略、安全管理等动态攻防对抗信息,生成动态攻击图,并实时调整防御手段对网络进行及时、有效的保护,实时地对网络系统的安全状态进行评估,并采用可视化的方法展现评估结果,在此基础上给出整体安全策略调整建议。最后通过实验证明了本方法的可行性和有效性。 In order to evaluate the network security, a real-time security assessment method based on dynamic attack graph was presented. At first, network security related information such as network vulnerabilities, topology informa- tion, asset value, II)S alerts, and firewall rules was fused into attack graph. Then network security situation was evalua- ted and results were shown through visualization method,on this basis, some corresponding suggests were given to im- prove security. Finally, the feasibility and validity of this method were proved through some experiments.
出处 《计算机科学》 CSCD 北大核心 2013年第2期133-138,共6页 Computer Science
基金 国防基础科研项目(A0420110006)资助
关键词 动态攻击图 实时评估 攻防对抗信息 Dynamic attack graph,Real-time assessment, Confront information of attack and defense
  • 相关文献

参考文献4

二级参考文献47

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 3董豆豆,周忠宝,冯静,孙权,周经伦.基于故障树的系统安全风险实时监测方法[J].国防科技大学学报,2006,28(2):111-116. 被引量:5
  • 4[1]Schneier B.Attack Trees[J].Dr.Dobb's Journal,1999,24(12):21-29.
  • 5[2]Dacier M,Deswartes Y,Kaaniche M.Quantitive Assessment of Operational Security Models and Tools[R].Technical Report Research Report 96493,LAAS,May 1996.
  • 6[3]Ortalo R,Deswarte Y,Kaaniche M.Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security[J].IEEE Transactions on Software Engineering,1999,25(5):633-650.
  • 7[4]Swiler L P,Phillips C,Gaylor T.A Graph-based Network-vulnerability Analysis System[R].Technical Report SAND97-3010/1,Sandia National Laboratories,Albuquerque,New Mexico and Livermore,California,1998.
  • 8[5]Jha S,Sheyner O,Wing J.Two Formal Analyses of Attack Graphs[C]//Proceedings:15th IEEE Computer Security Foundations Workshop (CSFW'15),Cape Breton,Nova Scotia,Canada,IEEE Computer Society,2002:49-63.
  • 9[6]Ritchey R W,Ammann P.Using Model Checking to Analyze Network Vulnerabilities[C]//Proceedings:IEEE Computer Society Symposium on Security and Privacy (S&P 2000),Oakland,California,IEEE Computer Society,2000:156-165.
  • 10[7]汪立东.一种量化的计算机系统和网络安全风险评估方法[D].哈尔滨:哈尔滨工业大学,2002.

共引文献401

同被引文献107

引证文献15

二级引证文献83

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部