期刊文献+

基于威胁传播采样的复杂信息系统风险评估 被引量:7

Risk Evaluation of Complex Information System Based on Threat Propagation Sampling
下载PDF
导出
摘要 互联网时代的信息安全已成为全社会关注的问题之一.信息系统是信息的载体,为有效评估大规模分布式复杂信息系统的风险,构建了一种基于威胁传播采样的复杂信息系统风险评估方法.该方法考虑到威胁在复杂信息系统中传播时,对资产结点的转移状态以及资产结点发出的威胁传播边进行采样来生成威胁传播树(threat propagation trees,TPT),然后通过计算威胁传播树中各资产结点的期望损失以及威胁传播树的概率来对整个复杂信息系统进行风险评估.实验分析表明,基于威胁传播采样的复杂信息系统风险评估方法,在生成威胁传播树时具有高效的时间效率,能够对复杂信息系统进行客观准确的风险评估,且在对复杂信息系统资产结点制定安全防护策略时,能够为安全风险管理者提供较为合理的安全指导建议. Information security has been one of the focuses of social concern in the age of Internet.There is no doubt that accurately assessing the security of information medium is becoming the focus of the present information security work.For evaluating the risk of the large-scale distributed complex information system,we propose a risk evaluation method of the complex information system based on threat propagation sampling.Firstly,when the threats propagate in the complex information system,the number of threat propagation trees(TPT)is reduced by sampling the transition states of the asset nodes and the threat propagation edges emitted by the asset nodes,then computing the expected value loss of each node in the threat propagation tree and the probability of each threat propagation tree to evaluate the risk of the complex information system.The experimental analysis not only shows the risk evaluation proposed in this paper has higher time-efficient compared with the traditional combined strategy when producing the threat propagation tree,but also can make an objective and accurate risk evaluation.Furthermore,it can give more comprehensive and rational security-guide advices for security-risk managers when developing some security protection strategies on the asset nodes of the complex information system.
出处 《计算机研究与发展》 EI CSCD 北大核心 2015年第7期1642-1659,共18页 Journal of Computer Research and Development
基金 国家"九七三"重点基础研究发展计划基金项目(2013CB329502) 国家自然科学基金项目(61035003) 国家"八六三"高技术研究发展计划基金项目(2012AA011003) 国家科技支撑计划基金项目(2012BA107B02)
关键词 复杂信息系统 威胁传播采样 风险评估 资产结点 威胁传播边 威胁传播树 complex information system threat propagation sampling risk evaluation asset node threat propagation edge threat propagation trees(TPT)
  • 相关文献

参考文献18

  • 1Jamin S, Raz D, Shavitt Y, et al. Guest editorial Internet and WWW measurement, mapping, and modeling [J]. IEEE Journal on Selected Areas in Communications, 2003, 21(6) : 877-878.
  • 2Jeong H, Tonbor B, Albert R, et al. The large-scale organization of metabolic networks[J]. Nature, 2000, 407 (6804): 651-654.
  • 3王占山,王军义,梁洪晶.复杂网络的相关研究及其进展[J].自动化学会通讯,2013,34(170):4-16.
  • 4Watts D J, Strogatz S H. Collective dynamics of "small- world" networks [J]. Nature, 1998, 393(6684): 440-442.
  • 5纪勇,张伟华,张证崎,张文娟.复杂数据通信网络风险评估研究[J].东北师大学报(自然科学版),2013,45(3):57-61. 被引量:6
  • 6姜伟,方滨兴,田志宏,张宏莉.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4):817-827. 被引量:153
  • 7Nicol D M, Liljenstam M. Models and analysis of active worm defense [C] //Proc of the 3rd Int Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. Berlin: Springer, 2005:38-53.
  • 8吴晓平,付钰.信息安全风险评估教程[M].武汉:武汉大学出版社,2011:105-108.
  • 9张利,彭建芬,杜宇鸽,王庆.信息安全风险评估的综合评估方法综述[J].清华大学学报(自然科学版),2012,52(10):1364-1369. 被引量:48
  • 10张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76

二级参考文献132

共引文献357

同被引文献57

引证文献7

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部