期刊文献+

基于累积效应的网络脆弱性扩散分析方法

New network vulnerability diffusion analysis method based on cumulative effect
下载PDF
导出
摘要 网络脆弱性评估是一种主动防范技术,意在攻击发生之前对安全态势进行分析进而制定防御措施,但传统的定量分析模型不能对实体间动态交互关系有很好的展现,而且大都不能得出风险扩散的全局化结果。将脆弱性扩散过程类比于社会网络中影响力传播过程,提出了基于累积效应的网络脆弱性扩散分析方法,定义的脆弱性扩散分析模型给出了细粒度级的主体关系结构,利用攻击效果累积特性提出的分析算法可以更准确地刻画脆弱性扩散规则,保证更好的影响范围。最后对该模型和算法进行了实例验证,在模型描述简洁性、分析结果准确性、安全建议合理性等方面的横向比较分析,验证了模型在评估结果直观性和制定成本最小安全措施等方面的优势。 Network vulnerability assessment which intends to safety situation analysis and establishment of defensive measures before attack is a kind of active defense technology, but the traditional quantitative analysis models cannot show the dynamic interactive relationship between entities, and most of them cannot get global results for risk diffusion. With reference to the influence of social network in the process of communication, a new network vulnerability diffusion analysis method based on cumulative effect was proposed. The defined vulnerability diffusion analysis model described subject relation structure in a more detailed level, and the algorithm proposed by using the accumulation characteristics in attack effects described vulnerability diffusion nile more accurately to ensure better influence range. At last, the model and algorithm were verified by a typical example, the horizontal comparison analysis on some aspects such as simplicity of the model description, accuracy of the analysis results, rationality of the safety recommendations were given. The results show that the method has an advantage in visual assessment results and the formulation of the cost minimum security measures.
出处 《计算机应用》 CSCD 北大核心 2015年第8期2169-2173,共5页 journal of Computer Applications
基金 陕西省科学技术研究发展计划项目(2013K1117) 陕西省重点学科建设专项资金资助项目(E08001) 陕西省教育厅科技计划项目(12JK0789)
关键词 脆弱性扩散 网络风险评估 网络安全 累积效应 攻击模型 vulnerability diffusion network risk assessment network security cumulative effect attack model
  • 相关文献

参考文献19

  • 1BRUCE L. Managed Vulnerability Assessment (MVA) - Mprove security by understanding your own vulnerabilities! [ J]. Network Security, 2002(4) : 8 -9.
  • 2RITECHEY R W, AMMANN P. Using model checking to analyze network vulnerabilities [ C]// S&P 2000: Proceedings of the 2000 IEEE Symposium on Research on Security and Privacy. Washing- ton, DC: IEEE Computer Society, 2000: 156-165.
  • 3AMMANN P, WIJESEKERA D, KAUSHIK S. Scalable, graph based network vulnerability analysis [ C]//CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM, 2002:217-224.
  • 4SHEYNER O, HAINES J, JHA S, et al. Automated generation and analysis of attack graphs [ C]// Proceedings of the 2002 IEEE Sym- posium on Security and Privacy. Washington, DC: IEEE Computer Society, 2002:273-284.
  • 5吴迪,连一峰,陈恺,刘玉岭.一种基于攻击图的安全威胁识别和分析方法[J].计算机学报,2012,35(9):1938-1950. 被引量:33
  • 6INGOLS K, LIPPMANN R, PIWOWARSKI K. Practical attack graph generation for network defense [ C]/! ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference. Piscat- away: IEEE, 2006: 121- 130.
  • 7INGOLS K, CHU M, LIPPMANN R, et al. Modeling modern net- work attacks and counter measures using attack graphs [ C]// AC- SAC '09: Proceedings of the 25th Annual Computer Security Appli- cations Conference. Piscataway: IEEE, 2009:117-126.
  • 8HOMER J, VARIKUTI A, OU X, et al. Improving attack graph vi- sualization through data reduction and attack grouping [ C]// VizSec 2008: Proceedings of the 5th International Workshop on Visualization for Computer Security, LNCS5210. Belin: Springer, 2008:68-79.
  • 9王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:57
  • 10张涛,胡铭曾,云晓春,张永铮.计算机网络安全性分析建模研究[J].通信学报,2005,26(12):100-109. 被引量:41

二级参考文献135

共引文献733

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部