期刊文献+

基于环境属性的网络威胁态势量化评估方法 被引量:13

Quantitative Threat Situational Assessment Based on Contextual Information
下载PDF
导出
摘要 传统的网络威胁态势评估方法主要是基于原始的警报信息,未结合目标网络的环境信息,使得方法的准确性受到很大的影响.提出了一种基于环境属性的网络威胁态势量化评估方法,该方法首先根据目标网络的环境属性对警报进行验证,判定引发警报的安全事件发生的可能性;然后,基于安全事件的风险级别及所针对的资产价值,分析安全事件发生后造成的损失;最后,基于安全事件发生的可能性及造成的损失量化评估网络的威胁态势.实例分析结果表明,该方法可以准确地量化评估网络的威胁态势. Traditional network threat situational assessment is based on primary alerts, however, its lack of access to contextual information compromises the accuracy of assessment. This paper proposes a method to quantitatively assess network threat situation based on not only alerts but also contextual information. The new method first verifies alerts along with contextual information to determine the successful possibility of events; then analyzes the loss caused by events according to the risk and the corresponding asset value of events; and finally quantitatively assesses network threat situation based on the successful possibility and the loss of events. Case studies show that the proposed method can evaluate network threat situations accurately.
出处 《软件学报》 EI CSCD 北大核心 2015年第7期1638-1649,共12页 Journal of Software
基金 国家高技术研究发展计划(863)(2012AA012803 2013AA014703) 国家科技支撑计划(2012BAH46B02) 国家自然科学基金(61070185) 中国科学院知识创新工程基金(XDA06030200)
关键词 威胁态势量化评估 警报验证 环境属性 资产价值 threat situational assessment alert verification contextual information asset value
  • 相关文献

参考文献2

二级参考文献36

共引文献74

同被引文献97

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 3张永铮,方滨兴,迟悦,云晓春.网络风险评估中网络节点关联性的研究[J].计算机学报,2007,30(2):234-240. 被引量:52
  • 4王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:55
  • 5张海霞,苏璞睿,冯登国.基于攻击能力增长的网络安全分析模型[J].计算机研究与发展,2007,44(12):2012-2019. 被引量:27
  • 6BASS T. Intrusion detection systems & multisensory data fusion: creating cyberspace situational awareness [J]. Communications of the ACM, 2000, 43(4): 99-105.
  • 7D'AMBROSIO B. Security Situation Assessment and Response Evaluation (SSARE) [C]// DISCEX'01: Proceedings of 2001 DARPA Information Survivability Conference & Exposition. Washington, D.C.: IEEE Computer Society, 2001: 387-394.
  • 8ABAD C, YURCIK W. UCLog+: a security situational awareness system for incident storage, querying, and correlation [C]// ICTSM 2006: Proceedings of the 14th International Conference on Telecommunication Systems Modeling and Analysis. Washington, D.C.: IEEE Computer Society, 2006: 316-322.
  • 9ONWUBIKO C, OWENS T. Situational awareness in computer network defense principles, methods and applications [M]. Hershey: IGI Global Snippet, 2012: 125-137.
  • 10KAVOUSI F, AKBARI B. Automatic learning of attack behavior patterns using Bayesian networks [C]// IST'2012: Proceedings of the 6th International Symposium on Telecommunications. Washington, D.C.: IEEE Computer Society, 2012: 999-1004.

引证文献13

二级引证文献173

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部