期刊文献+

基于攻防对抗的网络安全动态评估方法 被引量:3

Method of Network Security Dynamic Assessment Based on Attack-defense Confrontation
下载PDF
导出
摘要 根据网络攻防对抗实时变化的特点,提出了一种网络安全状态的动态评估方法。首先,根据敌我双方攻防特点,建立基于脆弱性状态迁移的网络安全模型;然后,在此基础上量化攻击成功的可能性和产生的后果,并分析攻防对抗行为对关键资产保密性、完整性、可用性等安全属性的影响,并通过实验验证了该方法的可行性及有效性。 According to the characteristic of the network attack-defense real-time variation, a dynamic assessment method of network security state was presented. Firstly, a network security model based on vulnerability state transition was built,according to the characteristics of attack and defense both sides. Then the success probability and the consequences of attack success were quantitated, and the effects of attack-defense confrontation behaviors on the key asset security attributes such as confidentiality, integrity and availability were analyzed. Finally, the feasibility and validity of this method were proved through an experiment.
出处 《计算机科学》 CSCD 北大核心 2013年第11A期214-218,共5页 Computer Science
基金 国防基础科研项目(A0420110006)资助
关键词 攻击图 安全评估 可视化 攻防对抗 Attack grapk, Security assessment, Visualization, Attack-defense confrontation
  • 相关文献

参考文献8

二级参考文献46

共引文献147

同被引文献61

  • 1余勇,林为民.基于等级保护的电力信息安全监控系统的设计[J].计算机科学,2012,39(S3):440-442. 被引量:20
  • 2[美]MlehaelE.whitman等,齐立博译.信息安全原理(第2版).清华大学出版社,2006.
  • 3谢建全.信息、系统安全防护技术.中国宇航出版社,2006.
  • 4PALANIAPPAN S, RABIAH A, MARIANA Y. A conceptual framework of info structure for information security risk assessment (ISRA)[J]. Journal of Information Security and Applications, 2013, 18: 45-52.
  • 5REBOLLO O, MELLADO D, FERNANDEZ-MEDINA E, et al. Empirical evaluation of a cloud computing informationsecurity governance framework [J]. Information and Software Technology, 2015, 58 44-57.
  • 6JIRASEK V. Practical application of information security models [J]. Information Security Technical Report, 2011, 17(1) : 1 8.
  • 7WANG Dong, LI Ruixue, WANG Huaiyu, et al. Research on the model of in-depth defense and control ability system of information security[C]//2014 the 7th International Conference on Information Management, Innovation Management and Industrial Engineering, October 25-26, 2014, Xi'an, China: 153-155.
  • 8高旭.浅谈信息网络战中的网络对抗技术[J].科教文汇,2009(2):276-276. 被引量:3
  • 9韦勇,连一峰.基于日志审计与性能修正算法的网络安全态势评估模型[J].计算机学报,2009,32(4):763-772. 被引量:97
  • 10刘安利,赵怀勋.网络对抗中的DDoS攻防技术分析[J].网络安全技术与应用,2009(7):45-47. 被引量:6

引证文献3

二级引证文献123

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部